Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 10 out of 14 pages
Viewing questions 181-200 out of questions
Questions # 181:

Cryptography does NOT help in:

Options:

A.

Detecting fraudulent insertion.


B.

Detecting fraudulent deletion.


C.

Detecting fraudulent modification.


D.

Detecting fraudulent disclosure.


Expert Solution
Questions # 182:

In a Public Key Infrastructure, how are public keys published?

Options:

A.

They are sent via e-mail.


B.

Through digital certificates.


C.

They are sent by owners.


D.

They are not published.


Expert Solution
Questions # 183:

Which of the following does NOT concern itself with key management?

Options:

A.

Internet Security Association Key Management Protocol (ISAKMP)


B.

Diffie-Hellman (DH)


C.

Cryptology (CRYPTO)


D.

Key Exchange Algorithm (KEA)


Expert Solution
Questions # 184:

Which of the following is NOT a true statement regarding the implementaton of the 3DES modes?

Options:

A.

DES-EEE1 uses one key


B.

DES-EEE2 uses two keys


C.

DES-EEE3 uses three keys


D.

DES-EDE2 uses two keys


Expert Solution
Questions # 185:

Which of the following protocol was used by the INITIAL version of the Terminal Access Controller Access Control System TACACS for communication between clients and servers?

Options:

A.

TCP


B.

SSL


C.

UDP


D.

SSH


Expert Solution
Questions # 186:

In Synchronous dynamic password tokens:

Options:

A.

The token generates a new password value at fixed time intervals (this password could be based on the time of day encrypted with a secret key).


B.

The token generates a new non-unique password value at fixed time intervals (this password could be based on the time of day encrypted with a secret key).


C.

The unique password is not entered into a system or workstation along with an owner's PIN.


D.

The authentication entity in a system or workstation knows an owner's secret key and PIN, and the entity verifies that the entered password is invalid and that it was entered during the invalid time window.


Expert Solution
Questions # 187:

Which of the following is implemented through scripts or smart agents that replays the users multiple log-ins against authentication servers to verify a user's identity which permit access to system services?

Options:

A.

Single Sign-On


B.

Dynamic Sign-On


C.

Smart cards


D.

Kerberos


Expert Solution
Questions # 188:

Who developed one of the first mathematical models of a multilevel-security computer system?

Options:

A.

Diffie and Hellman.


B.

Clark and Wilson.


C.

Bell and LaPadula.


D.

Gasser and Lipner.


Expert Solution
Questions # 189:

Rule-Based Access Control (RuBAC) access is determined by rules. Such rules would fit within what category of access control ?

Options:

A.

Discretionary Access Control (DAC)


B.

Mandatory Access control (MAC)


C.

Non-Discretionary Access Control (NDAC)


D.

Lattice-based Access control


Expert Solution
Questions # 190:

What mechanism automatically causes an alarm originating in a data center to be transmitted over the local municipal fire or police alarm circuits for relaying to both the local police/fire station and the appropriate headquarters?

Options:

A.

Central station alarm


B.

Proprietary alarm


C.

A remote station alarm


D.

An auxiliary station alarm


Expert Solution
Questions # 191:

Which of the following best ensures accountability of users for the actions taken within a system or domain?

Options:

A.

Identification


B.

Authentication


C.

Authorization


D.

Credentials


Expert Solution
Questions # 192:

What is called an automated means of identifying or authenticating the identity of a living person based on physiological or behavioral characteristics?

Options:

A.

Biometrics


B.

Micrometrics


C.

Macrometrics


D.

MicroBiometrics


Expert Solution
Questions # 193:

Who first described the DoD multilevel military security policy in abstract, formal terms?

Options:

A.

David Bell and Leonard LaPadula


B.

Rivest, Shamir and Adleman


C.

Whitfield Diffie and Martin Hellman


D.

David Clark and David Wilson


Expert Solution
Questions # 194:

Which of the following biometric parameters are better suited for authentication use over a long period of time?

Options:

A.

Iris pattern


B.

Voice pattern


C.

Signature dynamics


D.

Retina pattern


Expert Solution
Questions # 195:

Which of the following questions is less likely to help in assessing identification and authentication controls?

Options:

A.

Is a current list maintained and approved of authorized users and their access?


B.

Are passwords changed at least every ninety days or earlier if needed?


C.

Are inactive user identifications disabled after a specified period of time?


D.

Is there a process for reporting incidents?


Expert Solution
Questions # 196:

What is the most critical characteristic of a biometric identifying system?

Options:

A.

Perceived intrusiveness


B.

Storage requirements


C.

Accuracy


D.

Scalability


Expert Solution
Questions # 197:

In biometric identification systems, the parts of the body conveniently available for identification are:

Options:

A.

neck and mouth


B.

hands, face, and eyes


C.

feet and hair


D.

voice and neck


Expert Solution
Questions # 198:

Passwords can be required to change monthly, quarterly, or at other intervals:

Options:

A.

depending on the criticality of the information needing protection


B.

depending on the criticality of the information needing protection and the password's frequency of use


C.

depending on the password's frequency of use


D.

not depending on the criticality of the information needing protection but depending on the password's frequency of use


Expert Solution
Questions # 199:

Why should batch files and scripts be stored in a protected area?

Options:

A.

Because of the least privilege concept.


B.

Because they cannot be accessed by operators.


C.

Because they may contain credentials.


D.

Because of the need-to-know concept.


Expert Solution
Questions # 200:

Which of the following would be used to implement Mandatory Access Control (MAC)?

Options:

A.

Clark-Wilson Access Control


B.

Role-based access control


C.

Lattice-based access control


D.

User dictated access control


Expert Solution
Viewing page 10 out of 14 pages
Viewing questions 181-200 out of questions