Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 11 out of 14 pages
Viewing questions 201-220 out of questions
Questions # 201:

Which of the following exemplifies proper separation of duties?

Options:

A.

Operators are not permitted modify the system time.


B.

Programmers are permitted to use the system console.


C.

Console operators are permitted to mount tapes and disks.


D.

Tape operators are permitted to use the system console.


Expert Solution
Questions # 202:

A central authority determines what subjects can have access to certain objects based on the organizational security policy is called:

Options:

A.

Mandatory Access Control


B.

Discretionary Access Control


C.

Non-Discretionary Access Control


D.

Rule-based Access control


Expert Solution
Questions # 203:

What is called the act of a user professing an identity to a system, usually in the form of a log-on ID?

Options:

A.

Authentication


B.

Identification


C.

Authorization


D.

Confidentiality


Expert Solution
Questions # 204:

Which type of attack involves impersonating a user or a system?

Options:

A.

Smurfing attack


B.

Spoofing attack


C.

Spamming attack


D.

Sniffing attack


Expert Solution
Questions # 205:

The following is NOT a security characteristic we need to consider while choosing a biometric identification systems:

Options:

A.

data acquisition process


B.

cost


C.

enrollment process


D.

speed and user interface


Expert Solution
Questions # 206:

Which of the following is true about Kerberos?

Options:

A.

It utilizes public key cryptography.


B.

It encrypts data after a ticket is granted, but passwords are exchanged in plain text.


C.

It depends upon symmetric ciphers.


D.

It is a second party authentication system.


Expert Solution
Questions # 207:

Which of the following is most relevant to determining the maximum effective cost of access control?

Options:

A.

the value of information that is protected


B.

management's perceptions regarding data importance


C.

budget planning related to base versus incremental spending.


D.

the cost to replace lost data


Expert Solution
Questions # 208:

Which of the following is an example of discretionary access control?

Options:

A.

Identity-based access control


B.

Task-based access control


C.

Role-based access control


D.

Rule-based access control


Expert Solution
Questions # 209:

Which of the following is a trusted, third party authentication protocol that was developed under Project Athena at MIT?

Options:

A.

Kerberos


B.

SESAME


C.

KryptoKnight


D.

NetSP


Expert Solution
Questions # 210:

Which of the following statements pertaining to biometrics is false?

Options:

A.

Increased system sensitivity can cause a higher false rejection rate


B.

The crossover error rate is the point at which false rejection rate equals the false acceptance rate.


C.

False acceptance rate is also known as Type II error.


D.

Biometrics are based on the Type 2 authentication mechanism.


Expert Solution
Questions # 211:

Which of the following is most affected by denial-of-service (DOS) attacks?

Options:

A.

Confidentiality


B.

Integrity


C.

Accountability


D.

Availability


Expert Solution
Questions # 212:

The "vulnerability of a facility" to damage or attack may be assessed by all of the following except:

Options:

A.

Inspection


B.

History of losses


C.

Security controls


D.

security budget


Expert Solution
Questions # 213:

Which of the following is needed for System Accountability?

Options:

A.

Audit mechanisms.


B.

Documented design as laid out in the Common Criteria.


C.

Authorization.


D.

Formal verification of system design.


Expert Solution
Questions # 214:

Kerberos is vulnerable to replay in which of the following circumstances?

Options:

A.

When a private key is compromised within an allotted time window.


B.

When a public key is compromised within an allotted time window.


C.

When a ticket is compromised within an allotted time window.


D.

When the KSD is compromised within an allotted time window.


Expert Solution
Questions # 215:

Which of the following questions is less likely to help in assessing physical access controls?

Options:

A.

Does management regularly review the list of persons with physical access to sensitive facilities?


B.

Is the operating system configured to prevent circumvention of the security software and application controls?


C.

Are keys or other access devices needed to enter the computer room and media library?


D.

Are visitors to sensitive areas signed in and escorted?


Expert Solution
Questions # 216:

Which of the following is not a two-factor authentication mechanism?

Options:

A.

Something you have and something you know.


B.

Something you do and a password.


C.

A smartcard and something you are.


D.

Something you know and a password.


Expert Solution
Questions # 217:

RADIUS incorporates which of the following services?

Options:

A.

Authentication server and PIN codes.


B.

Authentication of clients and static passwords generation.


C.

Authentication of clients and dynamic passwords generation.


D.

Authentication server as well as support for Static and Dynamic passwords.


Expert Solution
Questions # 218:

The throughput rate is the rate at which individuals, once enrolled, can be processed and identified or authenticated by a biometric system. Acceptable throughput rates are in the range of:

Options:

A.

100 subjects per minute.


B.

25 subjects per minute.


C.

10 subjects per minute.


D.

50 subjects per minute.


Expert Solution
Questions # 219:

What is a common problem when using vibration detection devices for perimeter control?

Options:

A.

They are vulnerable to non-adversarial disturbances.


B.

They can be defeated by electronic means.


C.

Signal amplitude is affected by weather conditions.


D.

They must be buried below the frost line.


Expert Solution
Questions # 220:

Which of the following statements pertaining to Kerberos is false?

Options:

A.

The Key Distribution Center represents a single point of failure.


B.

Kerberos manages access permissions.


C.

Kerberos uses a database to keep a copy of all users' public keys.


D.

Kerberos uses symmetric key cryptography.


Expert Solution
Viewing page 11 out of 14 pages
Viewing questions 201-220 out of questions