ISC SSCP - Systems Security Certified Practitioner
Which one of the following factors is NOT one on which Authentication is based?
The type of discretionary access control (DAC) that is based on an individual's identity is also called:
The end result of implementing the principle of least privilege means which of the following?
In Synchronous dynamic password tokens:
What is called the percentage of valid subjects that are falsely rejected by a Biometric Authentication system?
What is called an automated means of identifying or authenticating the identity of a living person based on physiological or behavioral characteristics?
Which of the following statements pertaining to biometrics is false?
The Terminal Access Controller Access Control System (TACACS) employs which of the following?
Which of the following is not a logical control when implementing logical access security?
What is called a sequence of characters that is usually longer than the allotted number for a password?
Which of the following was developed by the National Computer Security Center (NCSC) for the US Department of Defense ?
Which authentication technique best protects against hijacking?
A department manager has read access to the salaries of the employees in his/her department but not to the salaries of employees in other departments. A database security mechanism that enforces this policy would typically be said to provide which of the following?
Detective/Technical measures:
Which of the following would assist the most in Host Based intrusion detection?
In which of the following security models is the subject's clearance compared to the object's classification such that specific rules can be applied to control how the subject-to-object interactions take place?