CISSP /58 CISSP Practice Exam Questions and Answers For Study 1 / 58 What is "Failure to Enroll (FTE)" in biometric systems? A system's inability to reject an unauthorized user A user's failure to provide the correct input at authentication The system fails to properly record a user’s biometric data during enrollment A system's inability to correctly recognize a legitimate user 2 / 58 4. Which biometric system is based on the measurement of blood vessels in the hand? Fingerprint scanning Palm vein scanning Iris recognition Hand geometry 3 / 58 Which one of the following is NOT a fundamental component of a Regulatory Security Policy? When it is to be done. Why is it to be done What is to be done. Who is to do it. 4 / 58 In addition to the accuracy of the biometric systems, there are other factors that must alsobe considered: These factors include the enrollment time and the throughput rate, but not acceptability These factors do not include the enrollment time, the throughput rate, and acceptability These factors include the enrollment time, the throughput rate, and acceptability These factors include the enrollment time, but not the throughput rate, neither the acceptability. 5 / 58 25. Which factor is least likely to affect the performance of a fingerprint recognition system? Dirt on the scanner High temperatures The user's age Moisture on the user's finger 6 / 58 9. Which metric measures the likelihood that a biometric system incorrectly rejects a legitimate user? False Rejection Rate (FRR) Cross Error Rate (CER) False Acceptance Rate (FAR) Equal Error Rate (EER) 7 / 58 15. Which type of biometric system captures the unique characteristics of the voice for authentication? Signature dynamics Facial recognition Voice recognition Gait recognition 8 / 58 In biometric identification systems, at the beginning, it was soon apparent that truly positiveidentification could only be based on physical attributes of a person. This raised thenecessicity of answering 2 questions: what was the age of a person and his income level what part of the body to be used and how to accomplish identification to be viable what was the sex of a person and his age what was the tone of the voice of a person and his habits 9 / 58 Which of the following eye scan methods is considered to be more intrusive? Body scans Iris scans Reflective scans Retinal scans 10 / 58 Which of the following methods is more microscopic and will analyze the direction of the ridges of the fingerprints for matching? Minutia matching Ridge matching None of the choices Flow direct 11 / 58 The quality of finger prints is crucial to maintain the necessary: ERR and FAR FRR FRR and FAR FAR 12 / 58 Type II errors occur when which of the following biometric system rates is high? Speed and throughput rate False reject rate False accept rate Crossover error rate 13 / 58 Which of the following is being considered as the most reliable kind of personal identification? Password Token Ticket Granting Finger print 14 / 58 Which of the following would be the first step in establishing an information securityprogram? Development of a security awareness-training program Purchase of security access control software Development and implementation of an information security standards manual Adoption of a corporate information security policy statement 15 / 58 7. Which biometric method is least invasive and often used for user convenience in mobile devices? Iris recognition Retina scanning Facial recognition Fingerprint scanning 16 / 58 When developing an information security policy, what is the FIRST step that should be taken? Obtain copies of mandatory regulations. Ensure policy is compliant with current working practices. Seek acceptance from other departments. Gain management approval. 17 / 58 Almost all types of detection permit a system's sensitivity to be increased or decreasedduring an inspection process. To have a valid measure of the system performance: the FRR is used the FAR is used The CER is used none of the above choices is correct 18 / 58 24. Which of the following reduces the risk of biometric spoofing? Biometric database replication Multi-factor authentication (MFA) Lower FAR Higher FRR 19 / 58 Which of the following are the types of eye scan in use today? Retinal scans and reflective scans Retinal scans and body scans. Reflective scans and iris scans Retinal scans and iris scans 20 / 58 Which must bear the primary responsibility for determining the level of protection needed forinformation systems resources? IS security specialists Senior Management Seniors security analysts system auditors 21 / 58 In which one of the following documents is the assignment of individual roles andresponsibilities MOST appropriately defined? Enforcement guidelines Security policy Program manual Acceptable use policy 22 / 58 What is the function of a corporate information security policy? Define the main security objectives which must be achieved and the security framework to meet business objectives. Define the specific assets to be protected and identify the specific tasks which must be completed to secure them Issue corporate standard to be used when addressing specific security problems. Issue guidelines in selecting equipment, configuration, design, and secure operations. 23 / 58 All of the following are basic components of a security policy EXCEPT the statement of applicability and compliance requirements. statement of performance of characteristics and requirements. definition of the issue and statement of relevant terms. statement of roles and responsibilities 24 / 58 8. What type of biometric system uses the measurement of the unique patterns in the colored ring around the pupil? Hand geometry Retina scanning Fingerprint scanning Iris recognition 25 / 58 12. Which of the following is considered a physiological biometric identifier? Keystroke dynamics Voice recognition Gait recognition Retina scanning 26 / 58 23. What is the typical use case for biometric systems in multi-factor authentication (MFA)? Something you have Something you are Something you know All of the above 27 / 58 18. Which biometric system analyzes the distinctive patterns of blood vessels in the retina for identification? Hand geometry Retina scanning Iris recognition Facial recognition 28 / 58 By requiring the user to use more than one finger to authenticate, you can: Provide statistical improvements in MTBF Provide statistical improvements in ERR Provide statistical improvements in FRR. Provide statistical improvements in EAR. 29 / 58 Which of the following choices is NOT part of a security policy? statement of management intend, supporting the goals and principles of information security definition of general and specific responsibilities for information security management definition of overall steps of information security and the importance of security description of specific technologies used in the field of information security 30 / 58 In the following choices there is one that is a typical biometric characteristics that is not used to uniquely authenticate an individual's identity? Retina scans Palm scans Skin scans Iris scans 31 / 58 16. What is the main challenge of using facial recognition systems in poorly lit environments? Inaccurate biometric template generation High FRR rate High FAR rate Inability to process data 32 / 58 13. In a biometric access system, what does a "template" refer to? The physical device used to scan biometric traits A reference document used to design the system The pattern of data flow in the network A record of an individual’s biometric data stored for comparison 33 / 58 Which one of the following statements describes management controls that are instituted toimplement a security policy? They may be administrative, procedural, or technical. They prevent users from accessing any control function. They eliminate the need for most auditing functions. They are generally inexpensive to implement. 34 / 58 Why must senior management endorse a security policy? So that they can be held legally accountable. So that they will accept ownership for security within the organization. So that employees will follow the policy directives. So that external bodies will recognize the organizations commitment to security. 35 / 58 14. Which of the following biometric methods has the highest accuracy? Iris recognition Voice recognition Hand geometry Fingerprint recognition 36 / 58 A security policy would include all of the following EXCEPT Enforcement Scope statement Background Audit requirements 37 / 58 Which of the following department managers would be best suited to oversee thedevelopment of an information security policy? Business operations Human Resources Information Systems Security administration 38 / 58 Which of the following biometrics devices has the highs Crossover Error Rate (CER)? Hang Geometry Iris scan Voice pattern Fingerprints 39 / 58 Which of the following biometric parameters are better suited for authentication use over along period of time? Voice pattern Iris pattern Retina pattern Signature dynamics 40 / 58 What is called the percentage of invalid subjects that are falsely accepted? Crossover Error Rate (CER) False Rejection Rate (FRR) or Type I Error False Acceptance Rate (FAR) or Type II Error True Acceptance Rate (TAR) or Type III error 41 / 58 3. What does the term "false acceptance rate (FAR)" refer to in a biometric system? The number of retries allowed in case of failure The percentage of authorized users incorrectly denied access The speed at which the system processes biometric data The percentage of unauthorized users incorrectly allowed access 42 / 58 6. What is a primary disadvantage of biometric systems? Users often forget how to use them They can be expensive to implement They are too secure They are very slow to process 43 / 58 21. Which biometric method uses the geometry of the hand for identification? Fingerprint recognition Hand geometry Retina scanning Palm vein scanning 44 / 58 Which one of the following should NOT be contained within a computer policy? Responsibilities of individuals and groups for protected information. Definition of management expectations. Statement of senior executive support. Definition of legal and regulatory controls. 45 / 58 22. Which of the following is an example of behavioral biometrics? Iris scanning Facial recognition Voice recognition Gait recognition 46 / 58 Which of the following are the valid categories of hand geometry scanning? Electrical and image-edge detection Mechanical and image-edge detection Logical and image-edge detection Mechanical and image-ridge detection. 47 / 58 You are comparing biometric systems. Security is the top priority. A low is mostimportant in this regard. MTBF FAR ERR FRR 48 / 58 What is the most critical characteristic of a biometric identifying system? Accuracy Reliability Perceived intrusiveness Storage requirements 49 / 58 5. Which of the following terms describes the point where the False Acceptance Rate (FAR) equals the False Rejection Rate (FRR)? Failure to Enroll (FTE) Cross Error Rate (CER) Biometric Error Rate (BER) Crossover Error Rate (CER) 50 / 58 Which one of the following is an important characteristic of an information security policy? Requires the identification of information owners. Identifies major functional areas of information. Lists applications that support the business function. Quantifies the effect of the loss of the information. 51 / 58 10. Biometric systems provide which of the following advantages over traditional access methods like passwords? They are more cost-effective They eliminate the need to remember a password They are immune to hacking Biometric data is easier to replicate 52 / 58 Ensuring the integrity of business information is the PRIMARY concern of Procedural Security. Logical Security Encryption Security On-line Security 53 / 58 2. Which of the following is NOT a type of biometric access control? Retina scanning Fingerprint scanning Iris recognition Passwords 54 / 58 1. What is the primary advantage of using biometric systems for authentication? Cost-effectiveness Fast deployment Ease of use Unique identification 55 / 58 20. Which of the following is considered the least secure biometric method due to environmental variables? Retina scanning Voice recognition Iris recognition Fingerprint recognition 56 / 58 Which of the following defines the intent of a system security policy? A definition of those items that must be excluded on the system. A listing of tools and applications that will be used to protect the system. A brief, high-level statement defining what is and is not permitted during the operation of the system. A definition of the particular settings that have been determined to provide optimum security. 57 / 58 19. What is a significant security risk associated with biometric systems? Biometric data is hard to replace once compromised Physical characteristics can change over time Biometric systems are immune to spoofing The data can be easily reset like passwords 58 / 58 17. Which of the following biometric methods is based on behavioral characteristics? Gait recognition Fingerprint recognition Retina scanning Palm vein scanning Your score is 0% Restart quiz