Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC SSCP - Systems Security Certified Practitioner

Page: 13 / 14
Total 1074 questions

Which of the following is the LEAST user accepted biometric device?

A.

Fingerprint

B.

Iris scan

C.

Retina scan

D.

Voice verification

A timely review of system access audit records would be an example of which of the basic security functions?

A.

avoidance.

B.

deterrence.

C.

prevention.

D.

detection.

What can be defined as a table of subjects and objects indicating what actions individual subjects can take upon individual objects?

A.

A capacity table

B.

An access control list

C.

An access control matrix

D.

A capability table

Which of the following is NOT part of the Kerberos authentication protocol?

A.

Symmetric key cryptography

B.

Authentication service (AS)

C.

Principals

D.

Public Key

Which of the following centralized access control mechanisms is the least appropriate for mobile workers accessing the corporate network over analog lines?

A.

TACACS

B.

Call-back

C.

CHAP

D.

RADIUS

Which access control type has a central authority that determine to what objects the subjects have access to and it is based on role or on the organizational security policy?

A.

Mandatory Access Control

B.

Discretionary Access Control

C.

Non-Discretionary Access Control

D.

Rule-based Access control

What is the Biba security model concerned with?

A.

Confidentiality

B.

Reliability

C.

Availability

D.

Integrity

Which of the following offers advantages such as the ability to use stronger passwords, easier password administration, one set of credential, and faster resource access?

A.

Smart cards

B.

Single Sign-On (SSO)

C.

Symmetric Ciphers

D.

Public Key Infrastructure (PKI)

Which TCSEC class specifies discretionary protection?

A.

B2

B.

B1

C.

C2

D.

C1

Which of the following is most appropriate to notify an internal user that session monitoring is being conducted?

A.

Logon Banners

B.

Wall poster

C.

Employee Handbook

D.

Written agreement

What is the main focus of the Bell-LaPadula security model?

A.

Accountability

B.

Integrity

C.

Confidentiality

D.

Availability

Which of following is not a service provided by AAA servers (Radius, TACACS and DIAMETER)?

A.

Authentication

B.

Administration

C.

Accounting

D.

Authorization

Which of the following can best eliminate dial-up access through a Remote Access Server as a hacking vector?

A.

Using a TACACS+ server.

B.

Installing the Remote Access Server outside the firewall and forcing legitimate users to authenticate to the firewall.

C.

Setting modem ring count to at least 5.

D.

Only attaching modems to non-networked hosts.

In addition to the accuracy of the biometric systems, there are other factors that must also be considered:

A.

These factors include the enrollment time and the throughput rate, but not acceptability.

B.

These factors do not include the enrollment time, the throughput rate, and acceptability.

C.

These factors include the enrollment time, the throughput rate, and acceptability.

D.

These factors include the enrollment time, but not the throughput rate, neither the acceptability.

Which of the following is used by RADIUS for communication between clients and servers?

A.

TCP

B.

SSL

C.

UDP

D.

SSH

The control measures that are intended to reveal the violations of security policy using software and hardware are associated with:

A.

Preventive/physical

B.

Detective/technical

C.

Detective/physical

D.

Detective/administrative

Which of the following access control models introduces user security clearance and data classification?

A.

Role-based access control

B.

Discretionary access control

C.

Non-discretionary access control

D.

Mandatory access control

Single Sign-on (SSO) is characterized by which of the following advantages?

A.

Convenience

B.

Convenience and centralized administration

C.

Convenience and centralized data administration

D.

Convenience and centralized network administration

What is the primary role of smartcards in a PKI?

A.

Transparent renewal of user keys

B.

Easy distribution of the certificates between the users

C.

Fast hardware encryption of the raw data

D.

Tamper resistant, mobile storage and application of private keys of the users

Which of the following division is defined in the TCSEC (Orange Book) as minimal protection?

A.

Division D

B.

Division C

C.

Division B

D.

Division A