CISSP Sample Test

Exit

Question 1 of 1

  Time Left


0 [{"id":3898,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:12:15","updated_at":"2016-03-12 19:58:58","questionName":"Which one of the following is the MOST effective method for reducing security vulnerabilities associated with building entrances?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3906,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:55:15","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following is an industry specific standard that PRIMARILY deals with privacy matters?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3900,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:15:19","updated_at":"2016-03-12 19:58:58","questionName":"International Organization for Standardization (ISO) standard 27002 provides guidance for vendor compliance by outlining","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4312,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:56:14","updated_at":"2016-03-12 19:58:58","questionName":"ABZ Organization is constructing a new secure facility and has elected to install a two-tier access control system, which will consist of proximity badges and biometric devices. The system security professional is tasked with acquiring the access control systems. The only requirement are to keep cost as low as possible and minimize down time. While evaluating the effectiveness of several new devices, the security professional should expect that a biometric device becomes more sensitive when","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3905,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:53:56","updated_at":"2016-03-12 19:58:58","questionName":"In a discretionary mode, who has delegation authority to grant access to information?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4311,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:52:38","updated_at":"2016-03-12 19:58:58","questionName":"What is the recommended frequency that a system recovery plan be tested in a stable data processing environment?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3909,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 01:00:22","updated_at":"2016-03-12 19:58:58","questionName":"What physical characteristics does a retinal scan biometric device manage?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3902,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:17:46","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following backup processing alternatives describes a computing facility with telecommunications equipment, some systems but minimal data?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3901,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:16:40","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following is the MAIN advantage of having an application gateway?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3908,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:58:41","updated_at":"2016-03-12 19:58:58","questionName":"The best practice to prevent logging clutter in application security is to","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3903,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:18:47","updated_at":"2016-03-12 19:58:58","questionName":"Important documents that have been soaked in water during fire suppression efforts should be restored by","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4309,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:49:22","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following defines the intent of a system security policy?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3907,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:57:15","updated_at":"2016-03-12 19:58:58","questionName":"What is the purpose of the Encapsulating Security Payload (ESP) in the Internet Protocol (IP) Security Architecture for Internet Protocol Security (IPSec)?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3899,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:13:50","updated_at":"2016-03-12 19:58:58","questionName":"Why is projection lighting mounted at the same height as the barbed wire topping of a fence?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4310,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:51:40","updated_at":"2016-03-12 19:58:58","questionName":"To support legacy applications that rely on risky protocols (e.g., plain text passwords), which one of the following can be implemented to mitigate the risks on a corporate network?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
3898
0
120
block

Which one of the following is the MOST effective method for reducing security vulnerabilities associated with building entrances?

Select the correct answer(s).  

(0/0)












3906
0
120
none
3900
0
120
none
4312
0
120
none
3905
0
120
none
4311
0
120
none
3909
0
120
none
3902
0
120
none
3901
0
120
none
3908
0
120
none
3903
0
120
none
4309
0
120
none
3907
0
120
none
3899
0
120
none
4310
0
120
none