Free Certification Practice Questions

ISC-SSCP

Loading…
A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:
#1
In Mandatory Access Control, sensitivity labels attached to object contain what information?
#2
What are the components of an object's sensitivity label?
#3
What does it mean to say that sensitivity labels are "incomparable"?
#4
Which of the following is true about Kerberos?
#5
Which of the following is needed for System Accountability?
#6
What is Kerberos?
#7
The three classic ways of authenticating yourself to the computer security software are by something you know, by something you have, and by something:
#8
A timely review of system access audit records would be an example of which of the basic security functions?
#9
A confidential number used as an authentication factor to verify a user's identity is called a:
#10
Which of the following exemplifies proper separation of duties?
#11
Which of the following is not a logical control when implementing logical access security?
#12
A department manager has read access to the salaries of the employees in his/her department but not to the salaries of employees in other departments. A database security mechanism that enforces this policy would typically be said to provide which of the following?
#13
Which of the following would constitute the best example of a password to use for access to a system by a network administrator?
#14
The number of violations that will be accepted or forgiven before a violation record is produced is called which of the following?
#15
The number of violations that will be accepted or forgiven before a violation record is produced is called which of the following?
#16
Examples of types of physical access controls include all EXCEPT which of the following?
#17
Guards are appropriate whenever the function required by the security program involves which of the following?
#18
Which of the following is the most reliable authentication method for remote access?
#19
Which of the following is the most reliable, secure means of removing data from magnetic storage media such as a magnetic tape, or a cassette?
#20
Which of the following is true of two-factor authentication?
#21
The primary service provided by Kerberos is which of the following?
#22
Which of the following is NOT a type of motion detector?
#23
Which of the following is NOT a technique used to perform a penetration test?
#24
Which of the following division is defined in the TCSEC (Orange Book) as minimal protection?
#25
Which of the following was developed by the National Computer Security Center (NCSC) for the US Department of Defense ?
#26
To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:
#27
Which access control type has a central authority that determine to what objects the subjects have access to and it is based on role or on the organizational security policy?
#28
What is called the use of technologies such as fingerprint, retina, and iris scans to authenticate the individuals requesting access to resources?
#29
What are called user interfaces that limit the functions that can be selected by a user?
#30