Skip survey header

CISSP Practice Quiz: Domain 5 Identity and Access Management Quiz 2

CISSP Practice Quiz: Domain 5 Identity and Access Management Quiz 2

1. Which one of the following terms best describes the use of a password as an authentication technique?
2. Hank tries to log into a system using biometric authentication in combination with his username and password but is rejected. What type of authentication event occurred?
3. Which one of the following controls is the best protection against a rainbow table attack?
4. In Kerberos authentication, what component is responsible for issuing the Ticket Granting Ticket?
5. What access control method is used by the Windows NTFS file system in its default configuration?
6. Carl works for an Internet service provider. The system used to purge user data requires that both he and his supervisor confirm the request before the data is deleted.

What access control mechanism is this system using?
7. Frank’s company reassigns people to new positions very often. What access control flaw is more likely to occur in this type of organization?
8. Which one of the following metrics for an access control system is least susceptible to adjustment by the administrator?
9. In a PKI system, what object does a user send someone to securely provide the encryption key necessary to send the user messages that are encrypted so that nobody else can read them?
10. Which one of the following combinations of controls is a good example of multifactor authentication?