Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC SSCP - Systems Security Certified Practitioner

Page: 14 / 14
Total 1074 questions

Which one of the following factors is NOT one on which Authentication is based?

A.

Type 1. Something you know, such as a PIN or password

B.

Type 2. Something you have, such as an ATM card or smart card

C.

Type 3. Something you are (based upon one or more intrinsic physical or behavioral traits), such as a fingerprint or retina scan

D.

Type 4. Something you are, such as a system administrator or security administrator

The type of discretionary access control (DAC) that is based on an individual's identity is also called:

A.

Identity-based Access control

B.

Rule-based Access control

C.

Non-Discretionary Access Control

D.

Lattice-based Access control

The end result of implementing the principle of least privilege means which of the following?

A.

Users would get access to only the info for which they have a need to know

B.

Users can access all systems.

C.

Users get new privileges added when they change positions.

D.

Authorization creep.

In Synchronous dynamic password tokens:

A.

The token generates a new password value at fixed time intervals (this password could be based on the time of day encrypted with a secret key).

B.

The token generates a new non-unique password value at fixed time intervals (this password could be based on the time of day encrypted with a secret key).

C.

The unique password is not entered into a system or workstation along with an owner's PIN.

D.

The authentication entity in a system or workstation knows an owner's secret key and PIN, and the entity verifies that the entered password is invalid and that it was entered during the invalid time window.

What is called the percentage of valid subjects that are falsely rejected by a Biometric Authentication system?

A.

False Rejection Rate (FRR) or Type I Error

B.

False Acceptance Rate (FAR) or Type II Error

C.

Crossover Error Rate (CER)

D.

True Rejection Rate (TRR) or Type III Error

What is called an automated means of identifying or authenticating the identity of a living person based on physiological or behavioral characteristics?

A.

Biometrics

B.

Micrometrics

C.

Macrometrics

D.

MicroBiometrics

Which of the following statements pertaining to biometrics is false?

A.

Increased system sensitivity can cause a higher false rejection rate

B.

The crossover error rate is the point at which false rejection rate equals the false acceptance rate.

C.

False acceptance rate is also known as Type II error.

D.

Biometrics are based on the Type 2 authentication mechanism.

The Terminal Access Controller Access Control System (TACACS) employs which of the following?

A.

a user ID and static password for network access

B.

a user ID and dynamic password for network access

C.

a user ID and symmetric password for network access

D.

a user ID and asymmetric password for network access

Which of the following is not a logical control when implementing logical access security?

A.

access profiles.

B.

userids.

C.

employee badges.

D.

passwords.

What is called a sequence of characters that is usually longer than the allotted number for a password?

A.

passphrase

B.

cognitive phrase

C.

anticipated phrase

D.

Real phrase

Which of the following was developed by the National Computer Security Center (NCSC) for the US Department of Defense ?

A.

TCSEC

B.

ITSEC

C.

DIACAP

D.

NIACAP

Which authentication technique best protects against hijacking?

A.

Static authentication

B.

Continuous authentication

C.

Robust authentication

D.

Strong authentication

A department manager has read access to the salaries of the employees in his/her department but not to the salaries of employees in other departments. A database security mechanism that enforces this policy would typically be said to provide which of the following?

A.

Content-dependent access control

B.

Context-dependent access control

C.

Least privileges access control

D.

Ownership-based access control

Detective/Technical measures:

A.

include intrusion detection systems and automatically-generated violation reports from audit trail information.

B.

do not include intrusion detection systems and automatically-generated violation reports from audit trail information.

C.

include intrusion detection systems but do not include automatically-generated violation reports from audit trail information.

D.

include intrusion detection systems and customised-generated violation reports from audit trail information.

Which of the following would assist the most in Host Based intrusion detection?

A.

audit trails.

B.

access control lists.

C.

security clearances.

D.

host-based authentication.

In which of the following security models is the subject's clearance compared to the object's classification such that specific rules can be applied to control how the subject-to-object interactions take place?

A.

Bell-LaPadula model

B.

Biba model

C.

Access Matrix model

D.

Take-Grant model