Page 1009 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1009

B.  Logical/technical

                    C.  Physical


                    D.  Preventive
                5.  Which of the following best expresses the primary goal when

                    controlling access to assets?

                    A.  Preserve confidentiality, integrity, and availability of systems
                        and data.

                    B.  Ensure that only valid objects can authenticate on a system.

                    C.  Prevent unauthorized access to subjects.

                    D.  Ensure that all subjects are authenticated.

                6.  A user logs in with a login ID and a password. What is the purpose
                    of the login ID?


                    A.  Authentication

                    B.  Authorization

                    C.  Accountability

                    D.  Identification

                7.  Accountability requires all of the following items except one.
                    Which item is not required for accountability?

                    A.  Identification

                    B.  Authentication

                    C.  Auditing

                    D.  Authorization


                8.  What can you use to prevent users from rotating between two
                    passwords?

                    A.  Password complexity

                    B.  Password history

                    C.  Password age

                    D.  Password length
   1004   1005   1006   1007   1008   1009   1010   1011   1012   1013   1014