Security+1

You got 0 of 4 possible points.
Your score was: 0 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 1

Question:

Besides credentials, what might be required to log into a computer system?

Response:

identification

token keys

access rights

authorized account

Score -1 of 1

Question:

What is the number of unique passwords Microsoft suggests before allowing a password to be re-used?

Response:

13

12

26

24

Score 1 of 1

Question:

What is the name of the authentication system developed at MIT to identify networked users' identity?

Response:

Aurora

Kerberos

CHAP

Pegasus

Score 0 of 1

Question:

To accept or reject a wireless device during a RADIUS authentication, the AP must create a data packet containing verification information called the ________.

Response:

access request

verification request

accounting request

authentication request