Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 13 out of 14 pages
Viewing questions 241-260 out of questions
Questions # 241:

Which of the following is a CHARACTERISTIC of a decision support system (DSS) in regards to Threats and Risks Analysis?

Options:

A.

DSS is aimed at solving highly structured problems.


B.

DSS emphasizes flexibility in the decision making approach of users.


C.

DSS supports only structured decision-making tasks.


D.

DSS combines the use of models with non-traditional data access and retrieval functions.


Expert Solution
Questions # 242:

Which of the following is used to interrupt the opportunity to use or perform collusion to subvert operation for fraudulent purposes?

Options:

A.

Key escrow


B.

Rotation of duties


C.

Principle of need-to-know


D.

Principle of least privilege


Expert Solution
Questions # 243:

Which of the following is an unintended communication path that is NOT protected by the system's normal security mechanisms?

Options:

A.

A trusted path


B.

A protection domain


C.

A covert channel


D.

A maintenance hook


Expert Solution
Questions # 244:

Which of the following is not a component of a Operations Security "triples"?

Options:

A.

Asset


B.

Threat


C.

Vulnerability


D.

Risk


Expert Solution
Questions # 245:

Which of the following statements pertaining to the security kernel is incorrect?

Options:

A.

The security kernel is made up of mechanisms that fall under the TCB and implements and enforces the reference monitor concept.


B.

The security kernel must provide isolation for the processes carrying out the reference monitor concept and they must be tamperproof.


C.

The security kernel must be small enough to be able to be tested and verified in a complete and comprehensive manner.


D.

The security kernel is an access control concept, not an actual physical component.


Expert Solution
Questions # 246:

Which of the following would be the best reason for separating the test and development environments?

Options:

A.

To restrict access to systems under test.


B.

To control the stability of the test environment.


C.

To segregate user and development staff.


D.

To secure access to systems under development.


Expert Solution
Questions # 247:

The preliminary steps to security planning include all of the following EXCEPT which of the following?

Options:

A.

Establish objectives.


B.

List planning assumptions.


C.

Establish a security audit function.


D.

Determine alternate courses of action


Expert Solution
Questions # 248:

Which of the following would best describe the difference between white-box testing and black-box testing?

Options:

A.

White-box testing is performed by an independent programmer team.


B.

Black-box testing uses the bottom-up approach.


C.

White-box testing examines the program internal logical structure.


D.

Black-box testing involves the business units


Expert Solution
Questions # 249:

Which of the following would be best suited to oversee the development of an information security policy?

Options:

A.

System Administrators


B.

End User


C.

Security Officers


D.

Security administrators


Expert Solution
Questions # 250:

Which of the following is the act of performing tests and evaluations to test a system's security level to see if it complies with the design specifications and security requirements?

Options:

A.

Validation


B.

Verification


C.

Assessment


D.

Accuracy


Expert Solution
Questions # 251:

A Security Kernel is defined as a strict implementation of a reference monitor mechanism responsible for enforcing a security policy. To be secure, the kernel must meet three basic conditions, what are they?

Options:

A.

Confidentiality, Integrity, and Availability


B.

Policy, mechanism, and assurance


C.

Isolation, layering, and abstraction


D.

Completeness, Isolation, and Verifiability


Expert Solution
Questions # 252:

During which phase of an IT system life cycle are security requirements developed?

Options:

A.

Operation


B.

Initiation


C.

Functional design analysis and Planning


D.

Implementation


Expert Solution
Questions # 253:

Which of the following is BEST defined as a physical control?

Options:

A.

Monitoring of system activity


B.

Fencing


C.

Identification and authentication methods


D.

Logical access control mechanisms


Expert Solution
Questions # 254:

Which of the following would best classify as a management control?

Options:

A.

Review of security controls


B.

Personnel security


C.

Physical and environmental protection


D.

Documentation


Expert Solution
Questions # 255:

Which property ensures that only the intended recipient can access the data and nobody else?

Options:

A.

Confidentiality


B.

Capability


C.

Integrity


D.

Availability


Expert Solution
Questions # 256:

IT security measures should:

Options:

A.

Be complex


B.

Be tailored to meet organizational security goals.


C.

Make sure that every asset of the organization is well protected.


D.

Not be developed in a layered fashion.


Expert Solution
Questions # 257:

Which of the following is NOT a technical control?

Options:

A.

Password and resource management


B.

Identification and authentication methods


C.

Monitoring for physical intrusion


D.

Intrusion Detection Systems


Expert Solution
Questions # 258:

What would BEST define a covert channel?

Options:

A.

An undocumented backdoor that has been left by a programmer in an operating system


B.

An open system port that should be closed.


C.

A communication channel that allows transfer of information in a manner that violates the system's security policy.


D.

A trojan horse.


Expert Solution
Questions # 259:

Which of the following best defines add-on security?

Options:

A.

Physical security complementing logical security measures.


B.

Protection mechanisms implemented as an integral part of an information system.


C.

Layer security.


D.

Protection mechanisms implemented after an information system has become operational.


Expert Solution
Questions # 260:

Which of the following is often the greatest challenge of distributed computing solutions?

Options:

A.

scalability


B.

security


C.

heterogeneity


D.

usability


Expert Solution
Viewing page 13 out of 14 pages
Viewing questions 241-260 out of questions