Security+1

You got 2 of 12 possible points.
Your score was: 17 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 0 of 8

Question:

Match the type of security attack with the best definition

Response:

MatchUser answerFeedback

brute force

a security attack which uses every possible word from a predetermined list

incorrect

dictionary

incorrect

cross-site scripting (XSS)

incorrect

SQL injection

incorrect

XML injection

incorrect

buffer overflow

incorrect

ping flood

incorrect

smurf attack

incorrect
Score 1 of 1

Question:

To accept or reject a wireless device during a RADIUS authentication, the AP must create a data packet containing verification information called the ________.

Response:

access request

verification request

authentication request

accounting request

Score 1 of 2

Question:

Which of the rules may be applied to a domain using an AD Group Policy:

Response:

Passwords cannot be shared between users of a single system

Passwords must be unique across multiple accounts

Minimum password length

Passwords may not use certain common phrases or words

Password history

Passwords must not be written down

Score 0 of 1

Question:

Besides credentials, what might be required to log into a computer system?

Response:

token keys

access rights

identification

authorized account