Security+1

You got 9 of 12 possible points.
Your score was: 75 %

Remember, these quizzes test your overall CISSP knowledge but should not be used as CISSP exam prep examples.

Question Results

Score 6 of 8

Question:

Match the type of security attack with the best definition

Response:

MatchUser answerFeedback

brute force

a security attack which uses every possible combination of characters from a predetermined list

correct

dictionary

a security attack which uses every possible word from a predetermined list

correct

cross-site scripting (XSS)

a security attack which injects scripts into web applications

correct

SQL injection

a security attack which injects scripts into web applications

incorrect

XML injection

a security attack which injects malicious data into user input data supplied to web applications

correct

buffer overflow

a security attack which injects malicious data or commands into the memory allocation beyond a fixed-length storage address or location

correct

ping flood

a security attack which injects ICMP packets into a network which are targeted to a specific host

correct

smurf attack

a security attack which injects ICMP requests into a network which are targeted from a specific host

correct
Score 2 of 2

Question:

Which of the rules may be applied to a domain using an AD Group Policy:

Response:

Passwords must be unique across multiple accounts

Minimum password length

Passwords must not be written down

Passwords cannot be shared between users of a single system

Password history

Passwords may not use certain common phrases or words

Score 0 of 1

Question:

Unlike standard biometrics or behavioral biometrics, cognitive biometrics focus on

Response:

a person's physical characteristics (iris, thumbprint, etc.)

how a person answers a CAPTCHA (text pattern recognition, math problem, etc.)

what a person knows, remembers or perceives (image recollection, memorable events and details, etc.)

the way a person uses a computer or performs an act (keyboard typing, voice recognition, etc.)

Score 1 of 1

Question:

What is the name of the authentication system developed at MIT to identify networked users' identity?

Response:

Pegasus

CHAP

Aurora

Kerberos