Free Certification Practice Questions

ISC-SSCP

Loading…
SSCP A central authority determines what subjects can have access to certain objects based on the organizational security policy is called:
#31
SSCP What is called the act of a user professing an identity to a system, usually in the form of a log-on ID?
#32
SSCP What is called the verification that the user's claimed identity is valid and is usually implemented through a user password at log-on time?
#33
SSCP Which one of the following factors is NOT one on which Authentication is based?
#34
SSCP Which type of password provides maximum security because a new password is required for each new log-on?
#35
SSCP What is called a password that is the same for each log-on session?
#36
SSCP Which of the following would be true about Static password tokens?
#37
SSCP What is called an automated means of identifying or authenticating the identity of a living person based on physiological or behavioral characteristics?
#38
SSCP In biometrics, "one-to-many" search against database of stored biometric images is done in:
#39
SSCP In biometrics, the "one-to-one" search used to verify claim to an identity made by a person is considered:
#40
SSCP What is called the percentage of valid subjects that are falsely rejected by a Biometric Authentication system?
#41
SSCP Which of the following offers advantages such as the ability to use stronger passwords, easier password administration, one set of credential, and faster resource access?
#42
SSCP Which of the following is implemented through scripts or smart agents that replays the users multiple log-ins against authentication servers to verify a user's identity which permit access to system services?
#43
SSCP Which of the following is a trusted, third party authentication protocol that was developed under Project Athena at MIT?
#44
SSCP Which of the following is addressed by Kerberos?
#45
SSCP Like the Kerberos protocol, SESAME is also subject to which of the following?
#46
SSCP Which of the following biometric devices offers the LOWEST CER?
#47
SSCP Which of the following statements pertaining to access control is false?
#48
SSCP Which access control model is also called Non Discretionary Access Control (NDAC)?
#49
SSCP What can be defined as a list of subjects along with their access rights that are authorized to access a specific object?
#50
SSCP What is the difference between Access Control Lists (ACLs) and Capability Tables?
#51
SSCP How are memory cards and smart cards different?
#52
SSCP What is the main focus of the Bell-LaPadula security model?
#53
SSCP What Orange Book security rating is reserved for systems that have been evaluated but fail to meet the criteria and requirements of the higher divisions?
#54
SSCP Smart cards are an example of which type of control?
#55
SSCP What security model implies a central authority that define rules and sometimes global rules, dictating what subjects can have access to what objects?
#56
SSCP Which of the following statements pertaining to biometrics is false?
#57
SSCP Which of the following statements pertaining to Kerberos is TRUE?
#58
SSCP Which of the following centralized access control mechanisms is the least appropriate for mobile workers accessing the corporate network over analog lines?
#59
SSCP What refers to legitimate users accessing networked services that would normally be restricted to them?
#60