Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level LPI Level 1 LPI Level 2 LPI Level 3
Contact

Quiz CISSP

Recent Comments

  1. Jan Dowsky on which type of Layer 2 attack can you intercept traffic …
  2. Joao on Which happens if the swap file of a virtual machine is …
  3. P.C.S.O.R. on What could cause this error?
  4. mur on Which two statements about administrative access to the Cisco Secure ACS SE are true?
  5. rubik on Which GPOs will apply to User2 when the user signs in t…

Quiz CISSP

Quiz CISSP, Certified Information Systems Security Professional (update September 5th,2013)

Which of the following is used to validate a users identity with a confidential number?

Which of the following is not a single sign-on access approach?

What do tickets allow within a Kerberos environment?

Which of the following is the best approach to validate the continued need for auser to have privileged access to system resources?

Which of the following is not an advantage of a centralized access control administration?

which of the following?

What type of attack attempts all possible solutions?

What determines if an organization is going to operate under a discretionary,mandatory, or nondiscretionary access control model?

What role does biometrics play in access control?

Which could be considered a single point of failure within a single sign-on implementation?

Posts navigation

Previous 1 … 981 982 983 … 989 Next
Equizzing
    Privacy Policy

© 2025 Equizzing