CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

Chapter 5 ■ dentity and Access Management (Domain 5)I 121



  1. Match each of the numbered authentication techniques with the appropriate lettered cat-
    egory. Each technique should be matched with exactly one category. Each category may be
    used once, more than once, or not at all.


Authentication technique


  1. Password

  2. ID card

  3. Retinal scan

  4. Smartphone token

  5. Fingerprint analysis


Category

A. Something you have
B. Something you know
C. Something you are


  1. Which of the following is not an access control layer?


A. Physical
B. Policy
C. Administrative
D. Tech n ica l


  1. Ben uses a software-based token that changes its code every minute. What type of token is
    he using?
    A. Asynchronous
    B. Smart card
    C. Synchronous
    D. Static

  2. What type of token-based authentication system uses a challenge/response process in
    which the challenge has to be entered on the token?
    A. Asynchronous
    B. Smart card
    C. Synchronous
    D. RFID

Free download pdf