CISSP /58 CISSP Practice Exam Questions and Answers For Study 1 / 58 The quality of finger prints is crucial to maintain the necessary: FRR and FAR ERR and FAR FRR FAR 2 / 58 18. Which biometric system analyzes the distinctive patterns of blood vessels in the retina for identification? Hand geometry Retina scanning Iris recognition Facial recognition 3 / 58 Which one of the following statements describes management controls that are instituted toimplement a security policy? They are generally inexpensive to implement. They prevent users from accessing any control function. They may be administrative, procedural, or technical. They eliminate the need for most auditing functions. 4 / 58 What is called the percentage of invalid subjects that are falsely accepted? False Rejection Rate (FRR) or Type I Error True Acceptance Rate (TAR) or Type III error Crossover Error Rate (CER) False Acceptance Rate (FAR) or Type II Error 5 / 58 Which of the following methods is more microscopic and will analyze the direction of the ridges of the fingerprints for matching? Minutia matching Ridge matching None of the choices Flow direct 6 / 58 Which one of the following is NOT a fundamental component of a Regulatory Security Policy? What is to be done. When it is to be done. Why is it to be done Who is to do it. 7 / 58 In the following choices there is one that is a typical biometric characteristics that is not used to uniquely authenticate an individual's identity? Iris scans Palm scans Retina scans Skin scans 8 / 58 Which of the following would be the first step in establishing an information securityprogram? Development of a security awareness-training program Purchase of security access control software Adoption of a corporate information security policy statement Development and implementation of an information security standards manual 9 / 58 5. Which of the following terms describes the point where the False Acceptance Rate (FAR) equals the False Rejection Rate (FRR)? Biometric Error Rate (BER) Cross Error Rate (CER) Crossover Error Rate (CER) Failure to Enroll (FTE) 10 / 58 Which one of the following is an important characteristic of an information security policy? Requires the identification of information owners. Lists applications that support the business function. Quantifies the effect of the loss of the information. Identifies major functional areas of information. 11 / 58 17. Which of the following biometric methods is based on behavioral characteristics? Gait recognition Fingerprint recognition Palm vein scanning Retina scanning 12 / 58 Which of the following defines the intent of a system security policy? A brief, high-level statement defining what is and is not permitted during the operation of the system. A definition of the particular settings that have been determined to provide optimum security. A definition of those items that must be excluded on the system. A listing of tools and applications that will be used to protect the system. 13 / 58 13. In a biometric access system, what does a "template" refer to? The pattern of data flow in the network A reference document used to design the system A record of an individual’s biometric data stored for comparison The physical device used to scan biometric traits 14 / 58 A security policy would include all of the following EXCEPT Enforcement Scope statement Background Audit requirements 15 / 58 By requiring the user to use more than one finger to authenticate, you can: Provide statistical improvements in ERR Provide statistical improvements in MTBF Provide statistical improvements in EAR. Provide statistical improvements in FRR. 16 / 58 What is "Failure to Enroll (FTE)" in biometric systems? A system's inability to correctly recognize a legitimate user The system fails to properly record a user’s biometric data during enrollment A system's inability to reject an unauthorized user A user's failure to provide the correct input at authentication 17 / 58 6. What is a primary disadvantage of biometric systems? Users often forget how to use them They can be expensive to implement They are too secure They are very slow to process 18 / 58 9. Which metric measures the likelihood that a biometric system incorrectly rejects a legitimate user? False Rejection Rate (FRR) Equal Error Rate (EER) Cross Error Rate (CER) False Acceptance Rate (FAR) 19 / 58 Which of the following are the valid categories of hand geometry scanning? Logical and image-edge detection Mechanical and image-edge detection Electrical and image-edge detection Mechanical and image-ridge detection. 20 / 58 7. Which biometric method is least invasive and often used for user convenience in mobile devices? Facial recognition Iris recognition Fingerprint scanning Retina scanning 21 / 58 12. Which of the following is considered a physiological biometric identifier? Retina scanning Keystroke dynamics Voice recognition Gait recognition 22 / 58 You are comparing biometric systems. Security is the top priority. A low is mostimportant in this regard. FRR FAR ERR MTBF 23 / 58 In addition to the accuracy of the biometric systems, there are other factors that must alsobe considered: These factors do not include the enrollment time, the throughput rate, and acceptability These factors include the enrollment time and the throughput rate, but not acceptability These factors include the enrollment time, the throughput rate, and acceptability These factors include the enrollment time, but not the throughput rate, neither the acceptability. 24 / 58 Which of the following biometric parameters are better suited for authentication use over along period of time? Signature dynamics Iris pattern Voice pattern Retina pattern 25 / 58 Which of the following are the types of eye scan in use today? Reflective scans and iris scans Retinal scans and body scans. Retinal scans and iris scans Retinal scans and reflective scans 26 / 58 Why must senior management endorse a security policy? So that employees will follow the policy directives. So that external bodies will recognize the organizations commitment to security. So that they can be held legally accountable. So that they will accept ownership for security within the organization. 27 / 58 Ensuring the integrity of business information is the PRIMARY concern of Procedural Security. Encryption Security On-line Security Logical Security 28 / 58 In which one of the following documents is the assignment of individual roles andresponsibilities MOST appropriately defined? Security policy Program manual Acceptable use policy Enforcement guidelines 29 / 58 Type II errors occur when which of the following biometric system rates is high? Speed and throughput rate False reject rate False accept rate Crossover error rate 30 / 58 In biometric identification systems, at the beginning, it was soon apparent that truly positiveidentification could only be based on physical attributes of a person. This raised thenecessicity of answering 2 questions: what was the age of a person and his income level what was the sex of a person and his age what was the tone of the voice of a person and his habits what part of the body to be used and how to accomplish identification to be viable 31 / 58 24. Which of the following reduces the risk of biometric spoofing? Higher FRR Lower FAR Multi-factor authentication (MFA) Biometric database replication 32 / 58 8. What type of biometric system uses the measurement of the unique patterns in the colored ring around the pupil? Hand geometry Iris recognition Fingerprint scanning Retina scanning 33 / 58 Which of the following is being considered as the most reliable kind of personal identification? Password Ticket Granting Finger print Token 34 / 58 20. Which of the following is considered the least secure biometric method due to environmental variables? Retina scanning Fingerprint recognition Voice recognition Iris recognition 35 / 58 Which must bear the primary responsibility for determining the level of protection needed forinformation systems resources? Seniors security analysts Senior Management IS security specialists system auditors 36 / 58 Which of the following biometrics devices has the highs Crossover Error Rate (CER)? Fingerprints Hang Geometry Voice pattern Iris scan 37 / 58 Which of the following choices is NOT part of a security policy? description of specific technologies used in the field of information security statement of management intend, supporting the goals and principles of information security definition of overall steps of information security and the importance of security definition of general and specific responsibilities for information security management 38 / 58 22. Which of the following is an example of behavioral biometrics? Iris scanning Facial recognition Gait recognition Voice recognition 39 / 58 25. Which factor is least likely to affect the performance of a fingerprint recognition system? The user's age Dirt on the scanner High temperatures Moisture on the user's finger 40 / 58 4. Which biometric system is based on the measurement of blood vessels in the hand? Hand geometry Palm vein scanning Fingerprint scanning Iris recognition 41 / 58 16. What is the main challenge of using facial recognition systems in poorly lit environments? Inability to process data High FAR rate Inaccurate biometric template generation High FRR rate 42 / 58 1. What is the primary advantage of using biometric systems for authentication? Ease of use Cost-effectiveness Fast deployment Unique identification 43 / 58 19. What is a significant security risk associated with biometric systems? Biometric systems are immune to spoofing The data can be easily reset like passwords Biometric data is hard to replace once compromised Physical characteristics can change over time 44 / 58 All of the following are basic components of a security policy EXCEPT the statement of roles and responsibilities statement of performance of characteristics and requirements. definition of the issue and statement of relevant terms. statement of applicability and compliance requirements. 45 / 58 3. What does the term "false acceptance rate (FAR)" refer to in a biometric system? The percentage of authorized users incorrectly denied access The percentage of unauthorized users incorrectly allowed access The speed at which the system processes biometric data The number of retries allowed in case of failure 46 / 58 Which one of the following should NOT be contained within a computer policy? Definition of legal and regulatory controls. Definition of management expectations. Statement of senior executive support. Responsibilities of individuals and groups for protected information. 47 / 58 Almost all types of detection permit a system's sensitivity to be increased or decreasedduring an inspection process. To have a valid measure of the system performance: the FRR is used none of the above choices is correct The CER is used the FAR is used 48 / 58 10. Biometric systems provide which of the following advantages over traditional access methods like passwords? Biometric data is easier to replicate They are immune to hacking They eliminate the need to remember a password They are more cost-effective 49 / 58 When developing an information security policy, what is the FIRST step that should be taken? Ensure policy is compliant with current working practices. Seek acceptance from other departments. Gain management approval. Obtain copies of mandatory regulations. 50 / 58 23. What is the typical use case for biometric systems in multi-factor authentication (MFA)? Something you have Something you are Something you know All of the above 51 / 58 14. Which of the following biometric methods has the highest accuracy? Voice recognition Iris recognition Hand geometry Fingerprint recognition 52 / 58 What is the function of a corporate information security policy? Issue guidelines in selecting equipment, configuration, design, and secure operations. Define the specific assets to be protected and identify the specific tasks which must be completed to secure them Issue corporate standard to be used when addressing specific security problems. Define the main security objectives which must be achieved and the security framework to meet business objectives. 53 / 58 21. Which biometric method uses the geometry of the hand for identification? Palm vein scanning Fingerprint recognition Hand geometry Retina scanning 54 / 58 What is the most critical characteristic of a biometric identifying system? Reliability Storage requirements Perceived intrusiveness Accuracy 55 / 58 Which of the following eye scan methods is considered to be more intrusive? Retinal scans Iris scans Reflective scans Body scans 56 / 58 2. Which of the following is NOT a type of biometric access control? Fingerprint scanning Passwords Iris recognition Retina scanning 57 / 58 Which of the following department managers would be best suited to oversee thedevelopment of an information security policy? Human Resources Security administration Business operations Information Systems 58 / 58 15. Which type of biometric system captures the unique characteristics of the voice for authentication? Signature dynamics Gait recognition Voice recognition Facial recognition Your score is 0% Restart quiz