CISSP Practice Exam 2025 – Complete Prep Guide

Question: 1 / 1980

Which network feature is referred to as a weak authentication method?

Username and password

Caller ID

The correct answer highlights a network feature that lacks robust security measures and is easily spoofed or manipulated. Caller ID is a system that transmits the telephone number of the calling party, but it can be easily falsified, allowing individuals to pretend to be someone else. This inherent vulnerability makes it a weak authentication method when relied upon for confirming identities.

In contrast, username and password authentication, while also relatively weak due to susceptibility to phishing and brute force attacks, does offer a more conventional form of identity verification than Caller ID. Two-factor authentication adds an additional layer of security by requiring a second form of identification, significantly strengthening the authentication process. Digital certificates utilize cryptographic methods to establish trust, making them a strong form of authentication when properly implemented. Therefore, Caller ID's superficial verification capability, combined with its ease of manipulation, positions it as the weak authentication method in this context.

Get further explanation with Examzify DeepDiveBeta

Two-factor authentication

Digital certificates

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy