Assessment Test

  1. Which of the following types of access control seeks to discover evidence of unwanted, unauthorized, or illicit behavior or activity?

    1. Preventive
    2. Deterrent
    3. Detective
    4. Corrective
  2. Define and detail the aspects of password selection that distinguish good password choices from ultimately poor password choices.

    1. Difficult to guess or unpredictable
    2. Meet minimum length requirements
    3. Meet specific complexity requirements
    4. All of the above
  3. Which of the following is most likely to detect DoS attacks?

    1. Host-based IDS
    2. Network-based IDS
    3. Vulnerability scanner
    4. Penetration testing
  4. Which of the following is considered a denial-of-service attack?

    1. Pretending to be a technical manager over the phone and asking a receptionist to ...

Get (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.