Security+1

You got 9 of 12 possible points.
Your score was: 75 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 2 of 2

Question:

Which of the rules may be applied to a domain using an AD Group Policy:

Response:

Passwords may not use certain common phrases or words

Minimum password length

Password history

Passwords must be unique across multiple accounts

Passwords must not be written down

Passwords cannot be shared between users of a single system

Score 0 of 1

Question:

Computer footprinting is:

Response:

the description of the physical space required for a given system

the times and locations of typical usage for a given system, user or service

the set of data common to a user across multiple platforms and/or websites (the collection of data from social media, browsing/purchasing history, ads, etc.)

the description the of the physical space, electrical load, thermal boundaries and noise levels required for a given system

Score 6 of 8

Question:

Match the type of security attack with the best definition

Response:

MatchUser answerFeedback

brute force

a security attack which uses every possible combination of characters from a predetermined list

correct

dictionary

a security attack which uses every possible word from a predetermined list

correct

cross-site scripting (XSS)

a security attack which injects scripts into web applications

correct

SQL injection

a security attack which injects malicious data or commands into the memory allocation beyond a fixed-length storage address or location

incorrect

XML injection

a security attack which injects malicious data into user input data supplied to web applications

correct

buffer overflow

a security attack which injects malicious data or commands into the memory allocation beyond a fixed-length storage address or location

correct

ping flood

a security attack which injects ICMP packets into a network which are targeted to a specific host

correct

smurf attack

a security attack which injects ICMP requests into a network which are targeted from a specific host

correct
Score 1 of 1

Question:

What is the name of the authentication system developed at MIT to identify networked users' identity?

Response:

Aurora

CHAP

Pegasus

Kerberos