The 'Highmark- CISSP Initial Skill Set Evaluation' assesses foundational skills in network and information security. It evaluates understanding of access controls, authentication methods, and system security techniques, vital for aspiring CISSP professionals.
The strongest authentication available because of the rarity of similar human characteristics such as fingerprints.
The weakest form of authentication because it can be forged or replicated.
The strongest form of authentication because it uses two authentication requirements.
Not the strongest form of authentication because it is based on only one authentication requirement.
Rate this question:
PAP
LDAP
RAS
RADIUS
Rate this question:
Access control
Authentication
Network communication
Process isolation
Rate this question:
Data storage requirements
Physical security
Number of concurrent users
Service desk response
Rate this question:
Hardware
Kernel
Hypervisor
Library
Rate this question:
Continuity planning
Application acquisition
Approval and implementation
Business impact assessment
ALE=AV x EF
ALE=SLE + EF
ALE=SLE x ARO
ALE=EF-SLE
Rate this question:
Physical buildings
People
Infrastructure
Financial assets
Rate this question:
Carrier
Payload
Stegomedium
Least significant bit
Rate this question:
Lucifer
Hybrid cryptography
Digital envelope
Session keys
Rate this question:
CMAC
Knapsack algorithm
Collision
One-way hatch
Rate this question:
Confidentiality
Integrity
Availability
Access
Rate this question:
Vendor software solutions
Security management principles
Security technologies
Physical plant security
Rate this question:
Threat
Asset
Vulnerability
Risk treatment
Rate this question:
Government Information Security Reform Act of 2000
Computer Security Act of 1987
Federal sentencing guidelines of 1991
Computer Fraud and Abuse Act of 1984
Rate this question:
Business plan template
Copyrights
Trademarks
Trade secrets
Rate this question:
The Electronic Communications Privacy Act of 1986
The Communications Assistance for Law Enforcement Act of 1994
The Economical and Protection of Proprietary Information Act of 1996
The Gramm-Leach-Bliley Act of 1999
Rate this question:
Keeps secret information secret
Is associated with security clearances
Prevents inadvertent access.
Ensures subjects receive privileges
Rate this question:
Evaluation of patches
Approval of patches
Testing of patches
Deployment of patches.
Rate this question:
Prevents one person from retaining business trade secrets.
Ensures a platform for increased job responsibility.
It prevents one person from having total control of a function or system.
Determines the level of security clearance.
Rate this question:
Flood plain level
Cost of IT equipment upgrade
Temperature control
Electrical reliability
Rate this question:
Detection
Deterrence
Distinguish
Denial
Rate this question:
Lighting
Fencing
Security personnel
Video monitoring
Rate this question:
Ring 0
Ring 3
Ring 1
Ring 4
Rate this question:
Compartmental mode
System High mode
Multilevel mode
Dedicated mode
Rate this question:
Database shadowing
Clusters
Electronic vaulting
Server mirroring
Rate this question:
Identifies hardware device addresses
Encrypts LLC sub layers
Performs error control
Controls media access
Rate this question:
Local Addressing
Authorization
Limited speed requirements
Authentication
Rate this question:
PBX
POTS
VoIP
TeleNet iX
Rate this question:
1
2
3
4
5
Rate this question:
1
2
3
4
5
Rate this question:
1
2
3
4
5
Rate this question:
1
2
3
4
5
Rate this question:
1
2
3
4
5
Rate this question:
1
2
3
4
5
Rate this question:
1
2
3
4
5
Rate this question:
1
2
3
4
5
Rate this question:
1
2
3
4
5
Rate this question:
Quiz Review Timeline (Updated): Jun 18, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.