SSCP A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:
#1
Answer: D✅ Correct❌ Incorrect
SSCP In Mandatory Access Control, sensitivity labels attached to object contain what information?
#2
Answer: B✅ Correct❌ Incorrect
SSCP What are the components of an object's sensitivity label?
#3
Answer: D✅ Correct❌ Incorrect
SSCP What does it mean to say that sensitivity labels are "incomparable"?
#4
Answer: D✅ Correct❌ Incorrect
SSCP Which of the following is true about Kerberos?
#5
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following is needed for System Accountability?
#6
Answer: A✅ Correct❌ Incorrect
SSCP What is Kerberos?
#7
Answer: B✅ Correct❌ Incorrect
SSCP The three classic ways of authenticating yourself to the computer security software are by something you know, by something you have, and by something:
#8
Answer: C✅ Correct❌ Incorrect
SSCP A timely review of system access audit records would be an example of which of the basic security functions?
#9
Answer: D✅ Correct❌ Incorrect
SSCP A confidential number used as an authentication factor to verify a user's identity is called a:
#10
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following exemplifies proper separation of duties?
#11
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following is not a logical control when implementing logical access security?
#12
Answer: C✅ Correct❌ Incorrect
SSCP A department manager has read access to the salaries of the employees in his/her department but not to the salaries of employees in other departments. A database security mechanism that enforces this policy would typically be said to provide which of the following?
#13
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following would constitute the best example of a password to use for access to a system by a network administrator?
#14
Answer: D✅ Correct❌ Incorrect
SSCP The number of violations that will be accepted or forgiven before a violation record is produced is called which of the following?
#15
Answer: A✅ Correct❌ Incorrect
SSCP The number of violations that will be accepted or forgiven before a violation record is produced is called which of the following?
#16
Answer: A✅ Correct❌ Incorrect
SSCP Examples of types of physical access controls include all EXCEPT which of the following?
#17
Answer: D✅ Correct❌ Incorrect
SSCP Guards are appropriate whenever the function required by the security program involves which of the following?
#18
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following is the most reliable authentication method for remote access?
#19
Answer: B✅ Correct❌ Incorrect
SSCP Which of the following is the most reliable, secure means of removing data from magnetic storage media such as a magnetic tape, or a cassette?
#20
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following is true of two-factor authentication?
#21
Answer: D✅ Correct❌ Incorrect
SSCP The primary service provided by Kerberos is which of the following?
#22
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following is NOT a type of motion detector?
#23
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following is NOT a technique used to perform a penetration test?
#24
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following division is defined in the TCSEC (Orange Book) as minimal protection?
#25
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following was developed by the National Computer Security Center (NCSC) for the US Department of Defense ?
#26
Answer: A✅ Correct❌ Incorrect
SSCP To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:
#27
Answer: A✅ Correct❌ Incorrect
SSCP Which access control type has a central authority that determine to what objects the subjects have access to and it is based on role or on the organizational security policy?
#28
Answer: C✅ Correct❌ Incorrect
SSCP What is called the use of technologies such as fingerprint, retina, and iris scans to authenticate the individuals requesting access to resources?
#29
Answer: C✅ Correct❌ Incorrect
SSCP What are called user interfaces that limit the functions that can be selected by a user?