Chapter 12Practice Test 4

  1. What type of access control is intended to discover unwanted or unauthorized activity by providing information after the event has occurred?
    1. Preventive
    2. Corrective
    3. Detective
    4. Directive
  2. Which one of the following presents the most complex decoy environment for an attacker to explore during an intrusion attempt?
    1. Honeypot
    2. Darknet
    3. Honeynet
    4. Pseudo-flaw

    Ben's organization is adopting biometric authentication for their high-security building's access control system. Using this chart, answer questions 3–5 about their adoption of the technology.

    A graph of percent versus sensitivity. It includes two curves. 1. F A R decremental curve labeled A. 2. F R R incremental curve labeled B.
  3. Ben's company is considering configuring their systems to work at the ...

Get ISC2 CISSP Certified Information Systems Security Professional Official Practice Tests, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.