CISSP /58 CISSP Practice Exam Questions and Answers For Study 1 / 58 24. Which of the following reduces the risk of biometric spoofing? Lower FAR Multi-factor authentication (MFA) Biometric database replication Higher FRR 2 / 58 25. Which factor is least likely to affect the performance of a fingerprint recognition system? Moisture on the user's finger The user's age Dirt on the scanner High temperatures 3 / 58 Which of the following eye scan methods is considered to be more intrusive? Retinal scans Iris scans Reflective scans Body scans 4 / 58 Which of the following would be the first step in establishing an information securityprogram? Development and implementation of an information security standards manual Adoption of a corporate information security policy statement Development of a security awareness-training program Purchase of security access control software 5 / 58 A security policy would include all of the following EXCEPT Enforcement Audit requirements Scope statement Background 6 / 58 17. Which of the following biometric methods is based on behavioral characteristics? Fingerprint recognition Retina scanning Gait recognition Palm vein scanning 7 / 58 3. What does the term "false acceptance rate (FAR)" refer to in a biometric system? The percentage of unauthorized users incorrectly allowed access The percentage of authorized users incorrectly denied access The number of retries allowed in case of failure The speed at which the system processes biometric data 8 / 58 6. What is a primary disadvantage of biometric systems? They can be expensive to implement They are very slow to process They are too secure Users often forget how to use them 9 / 58 Which of the following choices is NOT part of a security policy? description of specific technologies used in the field of information security definition of overall steps of information security and the importance of security definition of general and specific responsibilities for information security management statement of management intend, supporting the goals and principles of information security 10 / 58 2. Which of the following is NOT a type of biometric access control? Passwords Iris recognition Fingerprint scanning Retina scanning 11 / 58 Type II errors occur when which of the following biometric system rates is high? False reject rate False accept rate Crossover error rate Speed and throughput rate 12 / 58 What is called the percentage of invalid subjects that are falsely accepted? True Acceptance Rate (TAR) or Type III error False Acceptance Rate (FAR) or Type II Error Crossover Error Rate (CER) False Rejection Rate (FRR) or Type I Error 13 / 58 What is the function of a corporate information security policy? Define the main security objectives which must be achieved and the security framework to meet business objectives. Issue guidelines in selecting equipment, configuration, design, and secure operations. Define the specific assets to be protected and identify the specific tasks which must be completed to secure them Issue corporate standard to be used when addressing specific security problems. 14 / 58 By requiring the user to use more than one finger to authenticate, you can: Provide statistical improvements in ERR Provide statistical improvements in FRR. Provide statistical improvements in MTBF Provide statistical improvements in EAR. 15 / 58 Ensuring the integrity of business information is the PRIMARY concern of Encryption Security Logical Security On-line Security Procedural Security. 16 / 58 15. Which type of biometric system captures the unique characteristics of the voice for authentication? Signature dynamics Facial recognition Gait recognition Voice recognition 17 / 58 Which of the following defines the intent of a system security policy? A brief, high-level statement defining what is and is not permitted during the operation of the system. A listing of tools and applications that will be used to protect the system. A definition of the particular settings that have been determined to provide optimum security. A definition of those items that must be excluded on the system. 18 / 58 16. What is the main challenge of using facial recognition systems in poorly lit environments? High FRR rate Inability to process data High FAR rate Inaccurate biometric template generation 19 / 58 Which of the following is being considered as the most reliable kind of personal identification? Password Token Finger print Ticket Granting 20 / 58 12. Which of the following is considered a physiological biometric identifier? Retina scanning Voice recognition Gait recognition Keystroke dynamics 21 / 58 Which one of the following statements describes management controls that are instituted toimplement a security policy? They are generally inexpensive to implement. They prevent users from accessing any control function. They may be administrative, procedural, or technical. They eliminate the need for most auditing functions. 22 / 58 Which one of the following is NOT a fundamental component of a Regulatory Security Policy? When it is to be done. Who is to do it. What is to be done. Why is it to be done 23 / 58 When developing an information security policy, what is the FIRST step that should be taken? Seek acceptance from other departments. Ensure policy is compliant with current working practices. Obtain copies of mandatory regulations. Gain management approval. 24 / 58 4. Which biometric system is based on the measurement of blood vessels in the hand? Palm vein scanning Fingerprint scanning Hand geometry Iris recognition 25 / 58 Which of the following biometric parameters are better suited for authentication use over along period of time? Voice pattern Retina pattern Signature dynamics Iris pattern 26 / 58 Which one of the following should NOT be contained within a computer policy? Definition of management expectations. Definition of legal and regulatory controls. Statement of senior executive support. Responsibilities of individuals and groups for protected information. 27 / 58 You are comparing biometric systems. Security is the top priority. A low is mostimportant in this regard. MTBF FRR ERR FAR 28 / 58 Which of the following are the valid categories of hand geometry scanning? Mechanical and image-edge detection Mechanical and image-ridge detection. Electrical and image-edge detection Logical and image-edge detection 29 / 58 Which of the following methods is more microscopic and will analyze the direction of the ridges of the fingerprints for matching? Minutia matching Flow direct Ridge matching None of the choices 30 / 58 20. Which of the following is considered the least secure biometric method due to environmental variables? Iris recognition Voice recognition Retina scanning Fingerprint recognition 31 / 58 1. What is the primary advantage of using biometric systems for authentication? Ease of use Unique identification Fast deployment Cost-effectiveness 32 / 58 What is "Failure to Enroll (FTE)" in biometric systems? A user's failure to provide the correct input at authentication A system's inability to reject an unauthorized user The system fails to properly record a user’s biometric data during enrollment A system's inability to correctly recognize a legitimate user 33 / 58 19. What is a significant security risk associated with biometric systems? Biometric systems are immune to spoofing The data can be easily reset like passwords Physical characteristics can change over time Biometric data is hard to replace once compromised 34 / 58 22. Which of the following is an example of behavioral biometrics? Voice recognition Gait recognition Iris scanning Facial recognition 35 / 58 The quality of finger prints is crucial to maintain the necessary: FRR FRR and FAR FAR ERR and FAR 36 / 58 Which of the following department managers would be best suited to oversee thedevelopment of an information security policy? Security administration Information Systems Business operations Human Resources 37 / 58 In which one of the following documents is the assignment of individual roles andresponsibilities MOST appropriately defined? Program manual Security policy Acceptable use policy Enforcement guidelines 38 / 58 23. What is the typical use case for biometric systems in multi-factor authentication (MFA)? Something you know Something you are All of the above Something you have 39 / 58 All of the following are basic components of a security policy EXCEPT the statement of applicability and compliance requirements. definition of the issue and statement of relevant terms. statement of performance of characteristics and requirements. statement of roles and responsibilities 40 / 58 Which of the following are the types of eye scan in use today? Retinal scans and reflective scans Retinal scans and iris scans Reflective scans and iris scans Retinal scans and body scans. 41 / 58 13. In a biometric access system, what does a "template" refer to? A reference document used to design the system A record of an individual’s biometric data stored for comparison The physical device used to scan biometric traits The pattern of data flow in the network 42 / 58 Why must senior management endorse a security policy? So that they can be held legally accountable. So that employees will follow the policy directives. So that external bodies will recognize the organizations commitment to security. So that they will accept ownership for security within the organization. 43 / 58 Almost all types of detection permit a system's sensitivity to be increased or decreasedduring an inspection process. To have a valid measure of the system performance: none of the above choices is correct the FAR is used the FRR is used The CER is used 44 / 58 Which of the following biometrics devices has the highs Crossover Error Rate (CER)? Hang Geometry Voice pattern Fingerprints Iris scan 45 / 58 In the following choices there is one that is a typical biometric characteristics that is not used to uniquely authenticate an individual's identity? Skin scans Palm scans Iris scans Retina scans 46 / 58 What is the most critical characteristic of a biometric identifying system? Accuracy Storage requirements Perceived intrusiveness Reliability 47 / 58 14. Which of the following biometric methods has the highest accuracy? Hand geometry Fingerprint recognition Voice recognition Iris recognition 48 / 58 Which must bear the primary responsibility for determining the level of protection needed forinformation systems resources? IS security specialists Seniors security analysts system auditors Senior Management 49 / 58 8. What type of biometric system uses the measurement of the unique patterns in the colored ring around the pupil? Retina scanning Iris recognition Fingerprint scanning Hand geometry 50 / 58 Which one of the following is an important characteristic of an information security policy? Lists applications that support the business function. Identifies major functional areas of information. Requires the identification of information owners. Quantifies the effect of the loss of the information. 51 / 58 10. Biometric systems provide which of the following advantages over traditional access methods like passwords? They are immune to hacking They eliminate the need to remember a password They are more cost-effective Biometric data is easier to replicate 52 / 58 9. Which metric measures the likelihood that a biometric system incorrectly rejects a legitimate user? Equal Error Rate (EER) False Acceptance Rate (FAR) False Rejection Rate (FRR) Cross Error Rate (CER) 53 / 58 In biometric identification systems, at the beginning, it was soon apparent that truly positiveidentification could only be based on physical attributes of a person. This raised thenecessicity of answering 2 questions: what part of the body to be used and how to accomplish identification to be viable what was the age of a person and his income level what was the tone of the voice of a person and his habits what was the sex of a person and his age 54 / 58 7. Which biometric method is least invasive and often used for user convenience in mobile devices? Iris recognition Retina scanning Fingerprint scanning Facial recognition 55 / 58 18. Which biometric system analyzes the distinctive patterns of blood vessels in the retina for identification? Hand geometry Retina scanning Iris recognition Facial recognition 56 / 58 5. Which of the following terms describes the point where the False Acceptance Rate (FAR) equals the False Rejection Rate (FRR)? Crossover Error Rate (CER) Biometric Error Rate (BER) Failure to Enroll (FTE) Cross Error Rate (CER) 57 / 58 21. Which biometric method uses the geometry of the hand for identification? Palm vein scanning Hand geometry Retina scanning Fingerprint recognition 58 / 58 In addition to the accuracy of the biometric systems, there are other factors that must alsobe considered: These factors do not include the enrollment time, the throughput rate, and acceptability These factors include the enrollment time, the throughput rate, and acceptability These factors include the enrollment time, but not the throughput rate, neither the acceptability. These factors include the enrollment time and the throughput rate, but not acceptability Your score is 0% Restart quiz