{"id":34,"date":"2021-01-17T05:17:42","date_gmt":"2021-01-16T17:46:55","guid":{"rendered":"https:\/\/exampracticetests.com\/ISC\/CISSP\/certified-information-systems-security-professional-cissp-question027\/"},"modified":"2021-01-17T05:23:43","modified_gmt":"2021-01-17T05:23:43","slug":"certified-information-systems-security-professional-cissp-question027","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/ISC\/CISSP\/certified-information-systems-security-professional-cissp-question027\/","title":{"rendered":"Certified Information Systems Security Professional &#8211; CISSP &#8211; Question027"},"content":{"rendered":"<div class=\"question\">Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards? <br \/><strong><br \/>A.<\/strong> Personal Identity Verification (PIV) <br \/><strong>B.<\/strong> Cardholder Unique Identifier (CHUID) authentication <br \/><strong>C.<\/strong> Physical Access Control System (PACS) repeated attempt detection <br \/><strong>D.<\/strong> Asymmetric Card Authentication Key (CAK) challenge-response<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Which of the following is an effective control in preventing electronic cloning of Radio Frequency Identification (RFID) based access cards? A. Personal Identity Verification (PIV) B. Cardholder Unique Identifier (CHUID) authentication C. Physical Access Control System (PACS) repeated attempt detection D. Asymmetric Card Authentication Key (CAK) challenge-response Show Answer Hide Answer Correct Answer: C<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,391,30],"class_list":["post-34","post","type-post","status-publish","format-standard","hentry","category-certified-information-systems-security-professional-cissp","tag-certified-information-systems-security-professional-cissp","tag-choices","tag-question-027"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/34","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/comments?post=34"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/34\/revisions"}],"predecessor-version":[{"id":424,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/posts\/34\/revisions\/424"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/media?parent=34"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/categories?post=34"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/ISC\/CISSP\/wp-json\/wp\/v2\/tags?post=34"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}