Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 12 out of 14 pages
Viewing questions 221-240 out of questions
Questions # 221:

A department manager has read access to the salaries of the employees in his/her department but not to the salaries of employees in other departments. A database security mechanism that enforces this policy would typically be said to provide which of the following?

Options:

A.

Content-dependent access control


B.

Context-dependent access control


C.

Least privileges access control


D.

Ownership-based access control


Expert Solution
Questions # 222:

Crime Prevention Through Environmental Design (CPTED) is a discipline that:

Options:

A.

Outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior.


B.

Outlines how the proper design of the logical environment can reduce crime by directly affecting human behavior.


C.

Outlines how the proper design of the detective control environment can reduce crime by directly affecting human behavior.


D.

Outlines how the proper design of the administrative control environment can reduce crime by directly affecting human behavior.


Expert Solution
Questions # 223:

In discretionary access environments, which of the following entities is authorized to grant information access to other people?

Options:

A.

Manager


B.

Group Leader


C.

Security Manager


D.

Data Owner


Expert Solution
Questions # 224:

Which of the following is not a security goal for remote access?

Options:

A.

Reliable authentication of users and systems


B.

Protection of confidential data


C.

Easy to manage access control to systems and network resources


D.

Automated login for remote users


Expert Solution
Questions # 225:

A network-based vulnerability assessment is a type of test also referred to as:

Options:

A.

An active vulnerability assessment.


B.

A routing vulnerability assessment.


C.

A host-based vulnerability assessment.


D.

A passive vulnerability assessment.


Expert Solution
Questions # 226:

Which of the following offers advantages such as the ability to use stronger passwords, easier password administration, one set of credential, and faster resource access?

Options:

A.

Smart cards


B.

Single Sign-On (SSO)


C.

Symmetric Ciphers


D.

Public Key Infrastructure (PKI)


Expert Solution
Questions # 227:

An access system that grants users only those rights necessary for them to perform their work is operating on which security principle?

Options:

A.

Discretionary Access


B.

Least Privilege


C.

Mandatory Access


D.

Separation of Duties


Expert Solution
Questions # 228:

Which access control model achieves data integrity through well-formed transactions and separation of duties?

Options:

A.

Clark-Wilson model


B.

Biba model


C.

Non-interference model


D.

Sutherland model


Expert Solution
Questions # 229:

The number of violations that will be accepted or forgiven before a violation record is produced is called which of the following?

Options:

A.

clipping level


B.

acceptance level


C.

forgiveness level


D.

logging level


Expert Solution
Questions # 230:

In regards to information classification what is the main responsibility of information (data) owner?

Options:

A.

determining the data sensitivity or classification level


B.

running regular data backups


C.

audit the data users


D.

periodically check the validity and accuracy of the data


Expert Solution
Questions # 231:

When it comes to magnetic media sanitization, what difference can be made between clearing and purging information?

Options:

A.

Clearing completely erases the media whereas purging only removes file headers, allowing the recovery of files.


B.

Clearing renders information unrecoverable by a keyboard attack and purging renders information unrecoverable against laboratory attack.


C.

They both involve rewriting the media.


D.

Clearing renders information unrecoverable against a laboratory attack and purging renders information unrecoverable to a keyboard attack.


Expert Solution
Questions # 232:

Which of the following should NOT be performed by an operator?

Options:

A.

Implementing the initial program load


B.

Monitoring execution of the system


C.

Data entry


D.

Controlling job flow


Expert Solution
Questions # 233:

The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system is referred to as?

Options:

A.

Confidentiality


B.

Availability


C.

Integrity


D.

Reliability


Expert Solution
Questions # 234:

Which of the following is a not a preventative control?

Options:

A.

Deny programmer access to production data.


B.

Require change requests to include information about dates, descriptions, cost analysis and anticipated effects.


C.

Run a source comparison program between control and current source periodically.


D.

Establish procedures for emergency changes.


Expert Solution
Questions # 235:

Related to information security, the guarantee that the message sent is the message received with the assurance that the message was not intentionally or unintentionally altered is an example of which of the following?

Options:

A.

integrity


B.

confidentiality


C.

availability


D.

identity


Expert Solution
Questions # 236:

Which of the following rules is least likely to support the concept of least privilege?

Options:

A.

The number of administrative accounts should be kept to a minimum.


B.

Administrators should use regular accounts when performing routine operations like reading mail.


C.

Permissions on tools that are likely to be used by hackers should be as restrictive as possible.


D.

Only data to and from critical systems and applications should be allowed through the firewall.


Expert Solution
Questions # 237:

Which of the following is commonly used for retrofitting multilevel security to a database management system?

Options:

A.

trusted front-end.


B.

trusted back-end.


C.

controller.


D.

kernel.


Expert Solution
Questions # 238:

One purpose of a security awareness program is to modify:

Options:

A.

employee's attitudes and behaviors towards enterprise's security posture


B.

management's approach towards enterprise's security posture


C.

attitudes of employees with sensitive data


D.

corporate attitudes about safeguarding data


Expert Solution
Questions # 239:

Which of the following is best defined as an administrative declaration by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards?

Options:

A.

Certification


B.

Declaration


C.

Audit


D.

Accreditation


Expert Solution
Questions # 240:

When two or more separate entities (usually persons) operating in concert to protect sensitive functions or information must combine their knowledge to gain access to an asset, this is known as?

Options:

A.

Dual Control


B.

Need to know


C.

Separation of duties


D.

Segragation of duties


Expert Solution
Viewing page 12 out of 14 pages
Viewing questions 221-240 out of questions