O'Reilly logo

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition by Darril Gibson, James M Stewart, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Assessment Test

  1. Which of the following types of access control seeks to discover evidence of unwanted, unauthorized, or illicit behavior or activity?

    1. Preventive
    2. Deterrent
    3. Detective
    4. Corrective
  2. Define and detail the aspects of password selection that distinguish good password choices from ultimately poor password choices.

    1. Difficult to guess or unpredictable
    2. Meet minimum length requirements
    3. Meet specific complexity requirements
    4. All of the above
  3. Which of the following is most likely to detect DoS attacks?

    1. Host-based IDS
    2. Network-based IDS
    3. Vulnerability scanner
    4. Penetration testing
  4. Which of the following is considered a denial-of-service attack?

    1. Pretending to be a technical manager over the phone and asking a receptionist to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required