CISSP Sample Test

Exit

Question 1 of 1

  Time Left


0 [{"id":3909,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 01:00:22","updated_at":"2016-03-12 19:58:58","questionName":"What physical characteristics does a retinal scan biometric device manage?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":10,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3905,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:53:56","updated_at":"2016-03-12 19:58:58","questionName":"In a discretionary mode, who has delegation authority to grant access to information?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":6,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4312,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:56:14","updated_at":"2016-03-12 19:58:58","questionName":"ABZ Organization is constructing a new secure facility and has elected to install a two-tier access control system, which will consist of proximity badges and biometric devices. The system security professional is tasked with acquiring the access control systems. The only requirement are to keep cost as low as possible and minimize down time. While evaluating the effectiveness of several new devices, the security professional should expect that a biometric device becomes more sensitive when","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":14,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3900,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:15:19","updated_at":"2016-03-12 19:58:58","questionName":"International Organization for Standardization (ISO) standard 27002 provides guidance for vendor compliance by outlining","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":2,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3903,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:18:47","updated_at":"2016-03-12 19:58:58","questionName":"Important documents that have been soaked in water during fire suppression efforts should be restored by","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":5,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3908,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:58:41","updated_at":"2016-03-12 19:58:58","questionName":"The best practice to prevent logging clutter in application security is to","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":9,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4310,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:51:40","updated_at":"2016-03-12 19:58:58","questionName":"To support legacy applications that rely on risky protocols (e.g., plain text passwords), which one of the following can be implemented to mitigate the risks on a corporate network?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":12,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3902,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:17:46","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following backup processing alternatives describes a computing facility with telecommunications equipment, some systems but minimal data?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":4,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3907,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:57:15","updated_at":"2016-03-12 19:58:58","questionName":"What is the purpose of the Encapsulating Security Payload (ESP) in the Internet Protocol (IP) Security Architecture for Internet Protocol Security (IPSec)?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":8,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3898,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:12:15","updated_at":"2016-03-12 19:58:58","questionName":"Which one of the following is the MOST effective method for reducing security vulnerabilities associated with building entrances?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":0,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4309,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:49:22","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following defines the intent of a system security policy?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":11,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3906,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 00:55:15","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following is an industry specific standard that PRIMARILY deals with privacy matters?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":7,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":4311,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-17 09:52:38","updated_at":"2016-03-12 19:58:58","questionName":"What is the recommended frequency that a system recovery plan be tested in a stable data processing environment?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":13,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3901,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:16:40","updated_at":"2016-03-12 19:58:58","questionName":"Which of the following is the MAIN advantage of having an application gateway?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":3,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null},{"id":3899,"quiz_id":"361","answer_id":null,"answerType_id":"0","created_at":"2015-07-16 18:13:50","updated_at":"2016-03-12 19:58:58","questionName":"Why is projection lighting mounted at the same height as the barbed wire topping of a fence?","questionTimeSeconds":"0","questionTimeMinutes":"2","questionImagePath":null,"position":1,"explanation":null,"question_score_id":null,"lang":null,"questionAudioPath":null}]
3909
0
120
block

What physical characteristics does a retinal scan biometric device manage?

Select the correct answer(s).  

(0/0)












3905
0
120
none
4312
0
120
none
3900
0
120
none
3903
0
120
none
3908
0
120
none
4310
0
120
none
3902
0
120
none
3907
0
120
none
3898
0
120
none
4309
0
120
none
3906
0
120
none
4311
0
120
none
3901
0
120
none
3899
0
120
none