Free Certification Practice Questions

ISC-SSCP

Loading…
Which of the following is not a two-factor authentication mechanism?
#61
Which of the following access control models requires defining classification for objects?
#62
Which of the following statements pertaining to using Kerberos without any extension is false?
#63
Which of the following statements pertaining to Kerberos is false?
#64
Which of the following is an example of discretionary access control?
#65
Which of the following is NOT an advantage that TACACS+ has over TACACS?
#66
Which of the following remote access authentication systems is the most robust?
#67
What does the simple security (ss) property mean in the Bell-LaPadula model?
#68
Which access control model was proposed for enforcing access control in government and military applications?
#69
For maximum security design, what type of fence is most effective and cost-effective method (Foot are being used as measurement unit below)?
#70
Which of the following are additional access control objectives?
#71
Which of the following would be an example of the best password?
#72
Which of the following is NOT a form of detective administrative control?
#73
Which TCSEC level is labeled Controlled Access Protection?
#74
Why should batch files and scripts be stored in a protected area?
#75
In the Bell-LaPadula model, the Star-property is also called:
#76
What is one disadvantage of content-dependent protection of information?
#77
Which of the following is most appropriate to notify an internal user that session monitoring is being conducted?
#78
Which of the following are required for Life-Cycle Assurance?
#79
What does "System Integrity" mean?
#80
Configuration Management controls what?
#81
The information security staff's participation in which of the following system development life cycle phases provides maximum benefit to the organization?
#82
Which of the following is the act of performing tests and evaluations to test a system's security level to see if it complies with the design specifications and security requirements?
#83
Which of the following is NOT a basic component of security architecture?
#84
Which of the following is NOT true concerning Application Control?
#85
Which of the following is not one of the three goals of Integrity addressed by the Clark-Wilson model?
#86
External consistency ensures that the data stored in the database is:
#87
Which of the following is the MOST important aspect relating to employee termination?
#88
Which of the following is a CHARACTERISTIC of a decision support system (DSS) in regards to Threats and Risks Analysis?
#89
What would BEST define a covert channel?
#90