Security+1

You got 1 of 12 possible points.
Your score was: 8 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 1 of 2

Question:

Which of the rules may be applied to a domain using an AD Group Policy:

Response:

Passwords must be unique across multiple accounts

Passwords must not be written down

Passwords may not use certain common phrases or words

Password history

Passwords cannot be shared between users of a single system

Minimum password length

Score 0 of 1

Question:

A tree-structured DIB is comprised of elements called:

Response:

DIT

PEAR

EAP

DAP

Score 0 of 1

Question:

Unlike standard biometrics or behavioral biometrics, cognitive biometrics focus on

Response:

the way a person uses a computer or performs an act (keyboard typing, voice recognition, etc.)

a person's physical characteristics (iris, thumbprint, etc.)

what a person knows, remembers or perceives (image recollection, memorable events and details, etc.)

how a person answers a CAPTCHA (text pattern recognition, math problem, etc.)

Score 0 of 8

Question:

Match the type of security attack with the best definition

Response:

MatchUser answerFeedback

brute force

a security attack which uses every possible combination of characters from a predetermined list

correct

dictionary

a security attack which uses every possible word from a predetermined list

correct

cross-site scripting (XSS)

a security attack which injects malicious data into user input data supplied to web applications

incorrect

SQL injection

a security attack which injects malicious data into user input data supplied to web applications

incorrect

XML injection

a security attack which injects malicious commands into user input data supplied to web applications

incorrect

buffer overflow

a security attack which injects malicious data or commands into the memory allocation beyond a fixed-length storage address or location

correct

ping flood

a security attack which injects ICMP requests into a network which are targeted from a specific host

incorrect

smurf attack

a security attack which injects ICMP packets into a network which are targeted to a specific host

incorrect