Skip survey header

CISSP Practice Quiz: Domain 5 Identity and Access Management Quiz 1

CISSP Practice Quiz: Domain 5 Identity and Access Management Quiz 1

1. Toby is attempting to log in to a secure system. He provides his username at the prompt and then is asked to provide a password. What stage of the access control process is taking place at that moment?
2. Richard is attempting to access a secure system. He provides his username and password and then submits to a biometric scan, which he passes. He then attempts to open a door but receives the message “Access Denied.” At what stage of the access control process did he fail?
3. What metric is the best way to evaluate the performance of a biometric authentication system?
4. Which one of the following authentication techniques is considered the most invasive of user privacy?
5. Kim is using a two-factor authentication token that changes values every few seconds without her taking any action. What type of token system is she using?
6. Which one of the following is an example of multifactor authentication?
7. In the Kerberos authentication model, what does the client present to prove that it has successfully authenticated and gain a Service Ticket?
8. Which one of the following authentication protocols is not vendor-specific and is widely used to provide centralized authentication services today?
9. What type of access control system uses predefined rules and does not have the concept of a resource owner?
10. What type of social engineering attack specifically targets the passwords of senior executives?
This free quiz is sponsored by: