CISSP Question of the Day – 7-14-2016

Getting You Prepped for the CISSP Exam ...One Question at a Time!

Today’s CISSP question topic: Biometric Authentication

In Biometric authentication the false acceptance and false rejection rates of a system are used to measure a system’s effectiveness. Which of the following are true regarding false acceptance and false rejection? (Choose 6)

  1. A Type I error, a false acceptance, is a failure to reject an illegitimate user.
  2. A Type I error, a false rejection, is a failure to accept a legitimate user.
  3. A Type II error, a false acceptance, is a failure to reject an illegitimate user.
  4. A Type II error, a false rejection, is a failure to accept a legitimate user.
  5. Type I errors are a measure of the False Acceptance Rate (FAR)
  6. Type I errors are a measure of the False Rejection Rate (FRR)
  7. Type II errors are a measure of the False Acceptance Rate (FAR)
  8. Type II errors are a measure of the False Rejection Rate (FRR)
  9. Type I errors more negatively impact productivity and/or profitability compared to system security
  10. Type I errors more negatively impact system security compared to productivity and/or profitability
  11. Type II errors more negatively impact productivity and/or profitability compared to system security
  12. Type II errors more negatively impact system security compared to productivity and/or profitability



Check Your Answer


  1. A Type I error, a false rejection, is a failure to accept a legitimate user.
  2. A Type II error, a false acceptance, is a failure to reject an illegitimate user.
  3. Type I errors are a measure of the False Rejection Rate (FRR)
  4. Type II errors are a measure of the False Acceptance Rate (FAR)
  5. Type I errors more negatively impact productivity and/or profitability compared to system security
  6. Type II errors more negatively impact system security compared to productivity and/or profitability

Supporting Links:

  1. https://www.cccure.org/Documents/HISM/039-041.html


Co-workers, friends or colleagues studying for the CISSP exam, too? Share this question with them! Click an icon below to share to your preferred social media platform!
Posted in:
About the Author

Colin Weaver

Colin Weaver is co-owner and lead instructor at ITdojo, Inc., a network security and information assurance training center and consulting firm located in Virginia Beach, VA. His passion for technology, networks, and security has led him to become enthralled with the idea of IPv6 and its implementation. In this blog he will share with you glimpses of what he has learned and a hint at what you’ll learn in his classes.