O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Sample questions

Q1. Which one of the following is not a mandatory access control?

  1. Rule-based access control
  2. Role-based access control
  3. Lattice based access control
  4. Discretionary access control

Q2. If access to an object is controlled based on parameters such as location, time, and so on, then this type of access control is known as what?

  1. Content-dependent access control
  2. Context-dependent access control
  3. Character-dependent access control
  4. Class-dependent access control

Q3. Which one of the following is also called as a logic bomb?

  1. Spoofing
  2. Trojan horse getting activated on an event
  3. Vulnerability exploitation by an attacker
  4. Virus

Q4. Dictionary attack is a type of?

  1. Denial-of-Service attack
  2. Spoofing
  3. Password guessing attack
  4. Social engineering

Q5. Basic functionality ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required