CISSP Official Practice Tests by Mike Chapple, David Seidl

(chelsyfait) #1

288 Chapter 12 ■ Practice Test 4



  1. What type of access control is intended to discover unwanted or unauthorized activity by
    providing information after the event has occurred?
    A. Preventive
    B. Corrective
    C. Detective
    D. Directive

  2. Which one of the following presents the most complex decoy environment for an attacker
    to explore during an intrusion attempt?
    A. Honeypot
    B. Darknet
    C. Honeynet
    D. Pseudo flaw


Ben’s organization is adopting biometric authentication for their high-security building’s
access control system. Using this chart, answer questions 3–5 about their adoption of the
technology.

FAR
FRR

A

B

Sensitivity

Percent


  1. Ben’s company is considering configuring their systems to work at the level shown by point
    A on the diagram. What level are they setting the sensitivity to?
    A. The FRR crossover
    B. The FAR point
    C. The CER
    D. The CFR

  2. At point B, what problem is likely to occur?
    A. False acceptance will be very high.
    B. False rejection will be very high.
    C. False rejection will be very low.
    D. False acceptance will be very low.

Free download pdf