SSCP A central authority determines what subjects can have access to certain objects based on the organizational security policy is called:
#31
Answer: A✅ Correct❌ Incorrect
SSCP What is called the act of a user professing an identity to a system, usually in the form of a log-on ID?
#32
Answer: B✅ Correct❌ Incorrect
SSCP What is called the verification that the user's claimed identity is valid and is usually implemented through a user password at log-on time?
#33
Answer: A✅ Correct❌ Incorrect
SSCP Which one of the following factors is NOT one on which Authentication is based?
#34
Answer: D✅ Correct❌ Incorrect
SSCP Which type of password provides maximum security because a new password is required for each new log-on?
#35
Answer: A✅ Correct❌ Incorrect
SSCP What is called a password that is the same for each log-on session?
#36
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following would be true about Static password tokens?
#37
Answer: A✅ Correct❌ Incorrect
SSCP What is called an automated means of identifying or authenticating the identity of a living person based on physiological or behavioral characteristics?
#38
Answer: A✅ Correct❌ Incorrect
SSCP In biometrics, "one-to-many" search against database of stored biometric images is done in:
#39
Answer: B✅ Correct❌ Incorrect
SSCP In biometrics, the "one-to-one" search used to verify claim to an identity made by a person is considered:
#40
Answer: A✅ Correct❌ Incorrect
SSCP What is called the percentage of valid subjects that are falsely rejected by a Biometric Authentication system?
#41
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following offers advantages such as the ability to use stronger passwords, easier password administration, one set of credential, and faster resource access?
#42
Answer: B✅ Correct❌ Incorrect
SSCP Which of the following is implemented through scripts or smart agents that replays the users multiple log-ins against authentication servers to verify a user's identity which permit access to system services?
#43
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following is a trusted, third party authentication protocol that was developed under Project Athena at MIT?
#44
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following is addressed by Kerberos?
#45
Answer: A✅ Correct❌ Incorrect
SSCP Like the Kerberos protocol, SESAME is also subject to which of the following?
#46
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following biometric devices offers the LOWEST CER?
#47
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following statements pertaining to access control is false?
#48
Answer: B✅ Correct❌ Incorrect
SSCP Which access control model is also called Non Discretionary Access Control (NDAC)?
#49
Answer: C✅ Correct❌ Incorrect
SSCP What can be defined as a list of subjects along with their access rights that are authorized to access a specific object?
#50
Answer: B✅ Correct❌ Incorrect
SSCP What is the difference between Access Control Lists (ACLs) and Capability Tables?
#51
Answer: B✅ Correct❌ Incorrect
SSCP How are memory cards and smart cards different?
#52
Answer: C✅ Correct❌ Incorrect
SSCP What is the main focus of the Bell-LaPadula security model?
#53
Answer: C✅ Correct❌ Incorrect
SSCP What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
#54
Answer: B✅ Correct❌ Incorrect
SSCP Smart cards are an example of which type of control?
#55
Answer: C✅ Correct❌ Incorrect
SSCP What security model implies a central authority that define rules and sometimes global rules, dictating what subjects can have access to what objects?
#56
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following statements pertaining to biometrics is false?
#57
Answer: D✅ Correct❌ Incorrect
SSCP Which of the following statements pertaining to Kerberos is TRUE?
#58
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following centralized access control mechanisms is the least appropriate for mobile workers accessing the corporate network over analog lines?
#59
Answer: B✅ Correct❌ Incorrect
SSCP What refers to legitimate users accessing networked services that would normally be restricted to them?