Security+1

You got 6 of 12 possible points.
Your score was: 50 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 2 of 2

Question:

Which of the rules may be applied to a domain using an AD Group Policy:

Response:

Minimum password length

Passwords must not be written down

Passwords may not use certain common phrases or words

Passwords must be unique across multiple accounts

Password history

Passwords cannot be shared between users of a single system

Score 1 of 1

Question:

Unlike standard biometrics or behavioral biometrics, cognitive biometrics focus on

Response:

what a person knows, remembers or perceives (image recollection, memorable events and details, etc.)

how a person answers a CAPTCHA (text pattern recognition, math problem, etc.)

a person's physical characteristics (iris, thumbprint, etc.)

the way a person uses a computer or performs an act (keyboard typing, voice recognition, etc.)

Score 1 of 1

Question:

A tree-structured DIB is comprised of elements called:

Response:

DIT

DAP

PEAR

EAP

Score 2 of 8

Question:

Match the type of security attack with the best definition

Response:

MatchUser answerFeedback

brute force

a security attack which uses every possible combination of characters from a predetermined list

correct

dictionary

a security attack which uses every possible word from a predetermined list

correct

cross-site scripting (XSS)

a security attack which injects malicious data into user input data supplied to web applications

incorrect

SQL injection

a security attack which injects scripts into web applications

incorrect

XML injection

a security attack which injects scripts into web applications

incorrect

buffer overflow

a security attack which injects malicious data or commands into the memory allocation beyond a fixed-length storage address or location

correct

ping flood

a security attack which injects ICMP packets into a network which are targeted to a specific host

correct

smurf attack

a security attack which injects ICMP requests into a network which are targeted from a specific host

correct