CISSP

/58

CISSP Practice Exam Questions and Answers

For Study

1 / 58

The quality of finger prints is crucial to maintain the necessary:

2 / 58

18. Which biometric system analyzes the distinctive patterns of blood vessels in the retina for identification?

3 / 58

Which one of the following statements describes management controls that are instituted to
implement a security policy?

4 / 58

What is called the percentage of invalid subjects that are falsely accepted?

5 / 58

Which of the following methods is more microscopic and will analyze the direction of the ridges of the fingerprints for matching?

6 / 58

Which one of the following is NOT a fundamental component of a Regulatory Security Policy?

7 / 58

In the following choices there is one that is a typical biometric characteristics that is not used to uniquely authenticate an individual's identity?

8 / 58

Which of the following would be the first step in establishing an information security
program?

9 / 58

5. Which of the following terms describes the point where the False Acceptance Rate (FAR) equals the False Rejection Rate (FRR)?

10 / 58

Which one of the following is an important characteristic of an information security policy?

11 / 58

17. Which of the following biometric methods is based on behavioral characteristics?

12 / 58

Which of the following defines the intent of a system security policy?

13 / 58

13. In a biometric access system, what does a "template" refer to?

14 / 58

A security policy would include all of the following EXCEPT

15 / 58

By requiring the user to use more than one finger to authenticate, you can:

16 / 58

What is "Failure to Enroll (FTE)" in biometric systems?

17 / 58

6. What is a primary disadvantage of biometric systems?

18 / 58

9. Which metric measures the likelihood that a biometric system incorrectly rejects a legitimate user?

19 / 58

Which of the following are the valid categories of hand geometry scanning?

20 / 58

7. Which biometric method is least invasive and often used for user convenience in mobile devices?

21 / 58

12. Which of the following is considered a physiological biometric identifier?

22 / 58

You are comparing biometric systems. Security is the top priority. A low is most
important in this regard.

23 / 58

In addition to the accuracy of the biometric systems, there are other factors that must also
be considered:

24 / 58

Which of the following biometric parameters are better suited for authentication use over a
long period of time?

25 / 58

Which of the following are the types of eye scan in use today?

26 / 58

Why must senior management endorse a security policy?

27 / 58

Ensuring the integrity of business information is the PRIMARY concern of

28 / 58

In which one of the following documents is the assignment of individual roles and
responsibilities MOST appropriately defined?

29 / 58

Type II errors occur when which of the following biometric system rates is high?

30 / 58

In biometric identification systems, at the beginning, it was soon apparent that truly positive
identification could only be based on physical attributes of a person. This raised the
necessicity of answering 2 questions:

31 / 58

24. Which of the following reduces the risk of biometric spoofing?

32 / 58

8. What type of biometric system uses the measurement of the unique patterns in the colored ring around the pupil?

33 / 58

Which of the following is being considered as the most reliable kind of personal identification?

34 / 58

20. Which of the following is considered the least secure biometric method due to environmental variables?

35 / 58

Which must bear the primary responsibility for determining the level of protection needed for
information systems resources?

36 / 58

Which of the following biometrics devices has the highs Crossover Error Rate (CER)?

37 / 58

Which of the following choices is NOT part of a security policy?

38 / 58

22. Which of the following is an example of behavioral biometrics?

39 / 58

25. Which factor is least likely to affect the performance of a fingerprint recognition system?

40 / 58

4. Which biometric system is based on the measurement of blood vessels in the hand?

41 / 58

16. What is the main challenge of using facial recognition systems in poorly lit environments?

42 / 58

1. What is the primary advantage of using biometric systems for authentication?

43 / 58

19. What is a significant security risk associated with biometric systems?

44 / 58

All of the following are basic components of a security policy EXCEPT the

45 / 58

3. What does the term "false acceptance rate (FAR)" refer to in a biometric system?

46 / 58

Which one of the following should NOT be contained within a computer policy?

47 / 58

Almost all types of detection permit a system's sensitivity to be increased or decreased
during an inspection process. To have a valid measure of the system performance:

48 / 58

10. Biometric systems provide which of the following advantages over traditional access methods like passwords?

49 / 58

When developing an information security policy, what is the FIRST step that should be taken?

50 / 58

23. What is the typical use case for biometric systems in multi-factor authentication (MFA)?

51 / 58

14. Which of the following biometric methods has the highest accuracy?

52 / 58

What is the function of a corporate information security policy?

53 / 58

21. Which biometric method uses the geometry of the hand for identification?

54 / 58

What is the most critical characteristic of a biometric identifying system?

55 / 58

Which of the following eye scan methods is considered to be more intrusive?

56 / 58

2. Which of the following is NOT a type of biometric access control?

57 / 58

Which of the following department managers would be best suited to oversee the
development of an information security policy?

58 / 58

15. Which type of biometric system captures the unique characteristics of the voice for authentication?

Your score is

0%