Chapter 12Practice Test 4

  1. What type of access control is intended to discover unwanted or unauthorized activity by providing information after the event has occurred?
    1. Preventive
    2. Corrective
    3. Detective
    4. Directive
  2. Which one of the following presents the most complex decoy environment for an attacker to explore during an intrusion attempt?
    1. Honeypot
    2. Darknet
    3. Honeynet
    4. Pseudoflaw

    Ben's organization is adopting biometric authentication for their high-security building's access control system. Using this chart, answer questions 3–5 about their adoption of the technology.

    Graph depicts the adoption of the technology for the high-security building’s access control system.
  3. Ben's company is considering configuring their systems to work at the level ...

Get (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.