SSCP Practice Test Questions

1048 Questions


Topic 1: Access Control

What is called the verification that the user's claimed identity is valid and is usually
implemented through a user password at log-on time?


A.

Authentication




B.

 Identification


C.

 Integrity


D.

Confidentiality





RADIUS incorporates which of the following services?


A.

Authentication server and PIN codes.




B.

 Authentication of clients and static passwords generation.


C.

Authentication of clients and dynamic passwords generation.


D.

Authentication server as well as support for Static and Dynamic passwords.





What is called the act of a user professing an identity to a system, usually in the form of a
log-on ID?


A.

Authentication




B.

Identification


C.

Authorization


D.

 Confidentiality





Which of the following is most relevant to determining the maximum effective cost of
access control?


A.

the value of information that is protected



B.

management's perceptions regarding data importance


C.

budget planning related to base versus incremental spending


D.

.the cost to replace lost data





Which of the following describes the major disadvantage of many Single Sign-On (SSO)
implementations?


A.

Once an individual obtains access to the system through the initial log-on, they have
access to all resources within the environment that the account has access to.

.


B.

The initial logon process is cumbersome to discourage potential intruders.


C.

 Once a user obtains access to the system through the initial log-on, they only need to
logon to some applications


D.

Once a user obtains access to the system through the initial log-on, he has to logout
from all other systems





How are memory cards and smart cards different?


A.

Memory cards normally hold more memory than smart cards




B.

 Smart cards provide a two-factor authentication whereas memory cards don't


C.

Memory cards have no processing power


D.

Only smart cards can be used for ATM cards





Passwords can be required to change monthly, quarterly, or at other intervals:


A.

depending on the criticality of the information needing protection




B.

depending on the criticality of the information needing protection and the password's
frequency of use


C.

depending on the password's frequency of use


D.

not depending on the criticality of the information needing protection but depending on
the password's frequency of use





Which of the following access control models requires defining classification for objects?


A.

 Role-based access control


B.

Discretionary access control


C.

 Identity-based access control


D.

Mandatory access control





Which of the following would be true about Static password tokens?


A.

The owner identity is authenticated by the token




B.

The owner will never be authenticated by the token.


C.

The owner will authenticate himself to the system.


D.

The token does not authenticates the token owner but the system





Which of the following statements pertaining to access control is false?


A.

Users should only access data on a need-to-know basis.


.


B.

If access is not explicitly denied, it should be implicitly allowed.


C.

 Access rights should be granted based on the level of trust a company has on a subject.


D.

Roles can be an efficient way to assign rights to a type of user who performs certain
tasks





Which of the following is the most reliable authentication method for remote access?


A.

Variable callback system




B.

Synchronous token


C.

Fixed callback system


D.

 Combination of callback and caller ID





Which access control model is also called Non Discretionary Access Control (NDAC)?


A.

 Lattice based access control




B.

 Mandatory access control


C.

Role-based access control


D.

 Label-based access control






Page 7 out of 88 Pages
Previous