Free Certification Practice Questions

ISC-SSCP

Loading…
SSCP A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:
#1
SSCP In Mandatory Access Control, sensitivity labels attached to object contain what information?
#2
SSCP What are the components of an object's sensitivity label?
#3
SSCP What does it mean to say that sensitivity labels are "incomparable"?
#4
SSCP Which of the following is true about Kerberos?
#5
SSCP Which of the following is needed for System Accountability?
#6
SSCP What is Kerberos?
#7
SSCP The three classic ways of authenticating yourself to the computer security software are by something you know, by something you have, and by something:
#8
SSCP A timely review of system access audit records would be an example of which of the basic security functions?
#9
SSCP A confidential number used as an authentication factor to verify a user's identity is called a:
#10
SSCP Which of the following exemplifies proper separation of duties?
#11
SSCP Which of the following is not a logical control when implementing logical access security?
#12
SSCP A department manager has read access to the salaries of the employees in his/her department but not to the salaries of employees in other departments. A database security mechanism that enforces this policy would typically be said to provide which of the following?
#13
SSCP Which of the following would constitute the best example of a password to use for access to a system by a network administrator?
#14
SSCP The number of violations that will be accepted or forgiven before a violation record is produced is called which of the following?
#15
SSCP The number of violations that will be accepted or forgiven before a violation record is produced is called which of the following?
#16
SSCP Examples of types of physical access controls include all EXCEPT which of the following?
#17
SSCP Guards are appropriate whenever the function required by the security program involves which of the following?
#18
SSCP Which of the following is the most reliable authentication method for remote access?
#19
SSCP Which of the following is the most reliable, secure means of removing data from magnetic storage media such as a magnetic tape, or a cassette?
#20
SSCP Which of the following is true of two-factor authentication?
#21
SSCP The primary service provided by Kerberos is which of the following?
#22
SSCP Which of the following is NOT a type of motion detector?
#23
SSCP Which of the following is NOT a technique used to perform a penetration test?
#24
SSCP Which of the following division is defined in the TCSEC (Orange Book) as minimal protection?
#25
SSCP Which of the following was developed by the National Computer Security Center (NCSC) for the US Department of Defense ?
#26
SSCP To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:
#27
SSCP Which access control type has a central authority that determine to what objects the subjects have access to and it is based on role or on the organizational security policy?
#28
SSCP What is called the use of technologies such as fingerprint, retina, and iris scans to authenticate the individuals requesting access to resources?
#29
SSCP What are called user interfaces that limit the functions that can be selected by a user?
#30