CISSP /58 CISSP Practice Exam Questions and Answers For Study 1 / 58 Which of the following methods is more microscopic and will analyze the direction of the ridges of the fingerprints for matching? Ridge matching None of the choices Flow direct Minutia matching 2 / 58 Ensuring the integrity of business information is the PRIMARY concern of Encryption Security On-line Security Logical Security Procedural Security. 3 / 58 7. Which biometric method is least invasive and often used for user convenience in mobile devices? Facial recognition Iris recognition Fingerprint scanning Retina scanning 4 / 58 Which one of the following is an important characteristic of an information security policy? Requires the identification of information owners. Identifies major functional areas of information. Lists applications that support the business function. Quantifies the effect of the loss of the information. 5 / 58 17. Which of the following biometric methods is based on behavioral characteristics? Fingerprint recognition Retina scanning Palm vein scanning Gait recognition 6 / 58 19. What is a significant security risk associated with biometric systems? Biometric systems are immune to spoofing The data can be easily reset like passwords Physical characteristics can change over time Biometric data is hard to replace once compromised 7 / 58 By requiring the user to use more than one finger to authenticate, you can: Provide statistical improvements in EAR. Provide statistical improvements in FRR. Provide statistical improvements in ERR Provide statistical improvements in MTBF 8 / 58 In addition to the accuracy of the biometric systems, there are other factors that must alsobe considered: These factors include the enrollment time, the throughput rate, and acceptability These factors do not include the enrollment time, the throughput rate, and acceptability These factors include the enrollment time and the throughput rate, but not acceptability These factors include the enrollment time, but not the throughput rate, neither the acceptability. 9 / 58 8. What type of biometric system uses the measurement of the unique patterns in the colored ring around the pupil? Retina scanning Iris recognition Hand geometry Fingerprint scanning 10 / 58 Which of the following choices is NOT part of a security policy? description of specific technologies used in the field of information security definition of general and specific responsibilities for information security management definition of overall steps of information security and the importance of security statement of management intend, supporting the goals and principles of information security 11 / 58 15. Which type of biometric system captures the unique characteristics of the voice for authentication? Gait recognition Voice recognition Facial recognition Signature dynamics 12 / 58 Which of the following biometric parameters are better suited for authentication use over along period of time? Signature dynamics Retina pattern Voice pattern Iris pattern 13 / 58 13. In a biometric access system, what does a "template" refer to? The physical device used to scan biometric traits The pattern of data flow in the network A reference document used to design the system A record of an individual’s biometric data stored for comparison 14 / 58 You are comparing biometric systems. Security is the top priority. A low is mostimportant in this regard. MTBF FAR ERR FRR 15 / 58 Which one of the following statements describes management controls that are instituted toimplement a security policy? They eliminate the need for most auditing functions. They are generally inexpensive to implement. They prevent users from accessing any control function. They may be administrative, procedural, or technical. 16 / 58 24. Which of the following reduces the risk of biometric spoofing? Biometric database replication Higher FRR Multi-factor authentication (MFA) Lower FAR 17 / 58 25. Which factor is least likely to affect the performance of a fingerprint recognition system? High temperatures Dirt on the scanner Moisture on the user's finger The user's age 18 / 58 Which of the following are the valid categories of hand geometry scanning? Mechanical and image-edge detection Electrical and image-edge detection Logical and image-edge detection Mechanical and image-ridge detection. 19 / 58 Almost all types of detection permit a system's sensitivity to be increased or decreasedduring an inspection process. To have a valid measure of the system performance: The CER is used none of the above choices is correct the FAR is used the FRR is used 20 / 58 20. Which of the following is considered the least secure biometric method due to environmental variables? Retina scanning Voice recognition Iris recognition Fingerprint recognition 21 / 58 In biometric identification systems, at the beginning, it was soon apparent that truly positiveidentification could only be based on physical attributes of a person. This raised thenecessicity of answering 2 questions: what part of the body to be used and how to accomplish identification to be viable what was the tone of the voice of a person and his habits what was the age of a person and his income level what was the sex of a person and his age 22 / 58 Which of the following are the types of eye scan in use today? Retinal scans and iris scans Retinal scans and body scans. Retinal scans and reflective scans Reflective scans and iris scans 23 / 58 23. What is the typical use case for biometric systems in multi-factor authentication (MFA)? Something you know Something you have All of the above Something you are 24 / 58 Which of the following biometrics devices has the highs Crossover Error Rate (CER)? Iris scan Voice pattern Fingerprints Hang Geometry 25 / 58 Type II errors occur when which of the following biometric system rates is high? False reject rate False accept rate Speed and throughput rate Crossover error rate 26 / 58 All of the following are basic components of a security policy EXCEPT the statement of performance of characteristics and requirements. definition of the issue and statement of relevant terms. statement of applicability and compliance requirements. statement of roles and responsibilities 27 / 58 3. What does the term "false acceptance rate (FAR)" refer to in a biometric system? The number of retries allowed in case of failure The percentage of unauthorized users incorrectly allowed access The percentage of authorized users incorrectly denied access The speed at which the system processes biometric data 28 / 58 9. Which metric measures the likelihood that a biometric system incorrectly rejects a legitimate user? False Acceptance Rate (FAR) Cross Error Rate (CER) Equal Error Rate (EER) False Rejection Rate (FRR) 29 / 58 When developing an information security policy, what is the FIRST step that should be taken? Gain management approval. Ensure policy is compliant with current working practices. Seek acceptance from other departments. Obtain copies of mandatory regulations. 30 / 58 2. Which of the following is NOT a type of biometric access control? Retina scanning Passwords Fingerprint scanning Iris recognition 31 / 58 Which of the following department managers would be best suited to oversee thedevelopment of an information security policy? Business operations Human Resources Information Systems Security administration 32 / 58 What is the most critical characteristic of a biometric identifying system? Storage requirements Perceived intrusiveness Accuracy Reliability 33 / 58 Which of the following is being considered as the most reliable kind of personal identification? Password Token Ticket Granting Finger print 34 / 58 21. Which biometric method uses the geometry of the hand for identification? Fingerprint recognition Retina scanning Hand geometry Palm vein scanning 35 / 58 In the following choices there is one that is a typical biometric characteristics that is not used to uniquely authenticate an individual's identity? Retina scans Skin scans Iris scans Palm scans 36 / 58 A security policy would include all of the following EXCEPT Audit requirements Scope statement Enforcement Background 37 / 58 10. Biometric systems provide which of the following advantages over traditional access methods like passwords? They are immune to hacking Biometric data is easier to replicate They are more cost-effective They eliminate the need to remember a password 38 / 58 Which one of the following should NOT be contained within a computer policy? Definition of legal and regulatory controls. Definition of management expectations. Statement of senior executive support. Responsibilities of individuals and groups for protected information. 39 / 58 6. What is a primary disadvantage of biometric systems? Users often forget how to use them They can be expensive to implement They are too secure They are very slow to process 40 / 58 In which one of the following documents is the assignment of individual roles andresponsibilities MOST appropriately defined? Program manual Acceptable use policy Security policy Enforcement guidelines 41 / 58 The quality of finger prints is crucial to maintain the necessary: FAR FRR ERR and FAR FRR and FAR 42 / 58 16. What is the main challenge of using facial recognition systems in poorly lit environments? High FRR rate High FAR rate Inaccurate biometric template generation Inability to process data 43 / 58 22. Which of the following is an example of behavioral biometrics? Voice recognition Facial recognition Iris scanning Gait recognition 44 / 58 Why must senior management endorse a security policy? So that they will accept ownership for security within the organization. So that external bodies will recognize the organizations commitment to security. So that they can be held legally accountable. So that employees will follow the policy directives. 45 / 58 Which of the following eye scan methods is considered to be more intrusive? Iris scans Retinal scans Reflective scans Body scans 46 / 58 What is "Failure to Enroll (FTE)" in biometric systems? A system's inability to correctly recognize a legitimate user The system fails to properly record a user’s biometric data during enrollment A system's inability to reject an unauthorized user A user's failure to provide the correct input at authentication 47 / 58 Which must bear the primary responsibility for determining the level of protection needed forinformation systems resources? Senior Management IS security specialists Seniors security analysts system auditors 48 / 58 Which of the following defines the intent of a system security policy? A definition of those items that must be excluded on the system. A listing of tools and applications that will be used to protect the system. A definition of the particular settings that have been determined to provide optimum security. A brief, high-level statement defining what is and is not permitted during the operation of the system. 49 / 58 18. Which biometric system analyzes the distinctive patterns of blood vessels in the retina for identification? Facial recognition Retina scanning Iris recognition Hand geometry 50 / 58 4. Which biometric system is based on the measurement of blood vessels in the hand? Iris recognition Fingerprint scanning Hand geometry Palm vein scanning 51 / 58 14. Which of the following biometric methods has the highest accuracy? Voice recognition Iris recognition Fingerprint recognition Hand geometry 52 / 58 Which one of the following is NOT a fundamental component of a Regulatory Security Policy? What is to be done. Who is to do it. When it is to be done. Why is it to be done 53 / 58 12. Which of the following is considered a physiological biometric identifier? Voice recognition Keystroke dynamics Retina scanning Gait recognition 54 / 58 1. What is the primary advantage of using biometric systems for authentication? Ease of use Fast deployment Cost-effectiveness Unique identification 55 / 58 5. Which of the following terms describes the point where the False Acceptance Rate (FAR) equals the False Rejection Rate (FRR)? Crossover Error Rate (CER) Cross Error Rate (CER) Biometric Error Rate (BER) Failure to Enroll (FTE) 56 / 58 Which of the following would be the first step in establishing an information securityprogram? Development and implementation of an information security standards manual Adoption of a corporate information security policy statement Purchase of security access control software Development of a security awareness-training program 57 / 58 What is called the percentage of invalid subjects that are falsely accepted? True Acceptance Rate (TAR) or Type III error False Rejection Rate (FRR) or Type I Error Crossover Error Rate (CER) False Acceptance Rate (FAR) or Type II Error 58 / 58 What is the function of a corporate information security policy? Define the specific assets to be protected and identify the specific tasks which must be completed to secure them Issue corporate standard to be used when addressing specific security problems. Issue guidelines in selecting equipment, configuration, design, and secure operations. Define the main security objectives which must be achieved and the security framework to meet business objectives. Your score is 0% Restart quiz