Page 1009 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1009
B. Logical/technical
C. Physical
D. Preventive
5. Which of the following best expresses the primary goal when
controlling access to assets?
A. Preserve confidentiality, integrity, and availability of systems
and data.
B. Ensure that only valid objects can authenticate on a system.
C. Prevent unauthorized access to subjects.
D. Ensure that all subjects are authenticated.
6. A user logs in with a login ID and a password. What is the purpose
of the login ID?
A. Authentication
B. Authorization
C. Accountability
D. Identification
7. Accountability requires all of the following items except one.
Which item is not required for accountability?
A. Identification
B. Authentication
C. Auditing
D. Authorization
8. What can you use to prevent users from rotating between two
passwords?
A. Password complexity
B. Password history
C. Password age
D. Password length

