IT CertificationsAnswer Key

Cissp Badge

25 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Access badges

ANSWER

Used to enter secured areas of a facility and are used in conjunction with a badge reader to read information stored on the badge

QUESTION 2

Access Control Systems

ANSWER

Physical or electronic systems designed to control who, or what, has access to a network

QUESTION 3

Account management systems

ANSWER

Systems that attempt to streamline the administration of user identity across multiple systems

QUESTION 4

Authentication

ANSWER

The process of verifying the identity of the user

QUESTION 5

Authorization

ANSWER

The process of defining the specific resources a user needs and determining the type of access to those resources the user may have

QUESTION 6

Cryptographic Device

ANSWER

A hardware device that contains non-programmable logic and non-volatile storage dedicated to all cryptographic operations and protection of private keys.

QUESTION 7

Electronic authentication (e-authentication)

ANSWER

The process of establishing confidence in user identities electronically presented to an information system

QUESTION 8

Facility access control

ANSWER

Protects enterprise assets and provides a history of who gained access and when the access was granted

QUESTION 9

Identity as a Service (IDaaS)

ANSWER

Cloud-based services that broker identity and access management functions to target systems on customers' premises and/or in the cloud

QUESTION 10

Identity proofing

ANSWER

The process of collecting and verifying information about a person for the purpose of proving that a person who has requested an account, a credential, or other special privilege is indeed who he or she claims to be, and establishing a reliable relationsh

QUESTION 11

Kerberos

ANSWER

Developing standard for authenticating network users. Kerberos offers two key benefits: it functions in a multi-vendor network, and it does not transmit passwords over the network.

QUESTION 12

Logical access controls

ANSWER

Protection mechanisms that limit users' access to information and restrict their forms of access on the system to only what is appropriate for them

QUESTION 13

MAC address

ANSWER

A 48-bit number (typically represented in hexadecimal format) that is supposed to be globally unique

QUESTION 14

Mandatory Access Controls (MACs)

ANSWER

Access control that requires the system itself to manage access controls in accordance with the organization's security policies

QUESTION 15

Multi-factor Authentication

ANSWER

Ensures that a user is who they claim to be. The more factors used to determine a person's identity, the greater the trust of authenticity.

QUESTION 16

Password Management System

ANSWER

A system that manages passwords consistently across the enterprise

QUESTION 17

Physical Access Control Systems (PACS)

ANSWER

Allows authorized security personnel to simultaneously manage and monitor multiple entry points from a single, centralized location

QUESTION 18

Radio Frequency Identification (RFID)

ANSWER

A non-contact, automatic identification technology that uses radio signals to identify, track, sort and detect a variety of objects including people, vehicles, goods and assets without the need for direct contact

QUESTION 19

Role-Based Access Control (RBAC)

ANSWER

An access control model that bases the access control authorizations on the roles (or functions) that the user is assigned within an organization

QUESTION 20

Rule-Based Access Control

ANSWER

An access control model that based on a list of predefined rules that determine what accesses should be granted

QUESTION 21

Security Assertion Markup Language 2.0 (SAML 2.0)

ANSWER

A version of the SAML OASIS standard for exchanging authentication and authorization data between security domains

QUESTION 22

Single factor authentication

ANSWER

Involves the use of simply one of the three available factors solely in order to carry out the authentication process being requested

QUESTION 23

Single Sign-On (SSO)

ANSWER

A unified login experience (from the viewpoint of the end user) when accessing one or more systems

QUESTION 24

Trusted Platform Modules (TPM)

ANSWER

A local hardware encryption engine and secured storage for encryption keys

QUESTION 25

User ID

ANSWER

Provides the system with a way of uniquely identifying a particular user amongst all the users of that system

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials