ISC SSCP - Systems Security Certified Practitioner Exam
Page: 2 / 215
Total 1074 questions
Question #6 (Topic: Topic 1)
Which of the following is needed for System Accountability?
A. Audit mechanisms.
B. Documented design as laid out in the Common Criteria.
C. Authorization.
D. Formal verification of system design.
Answer: A
Question #7 (Topic: Topic 1)
What is Kerberos?
A. A three-headed dog from the egyptian mythology.
B. A trusted third-party authentication protocol.
C. A security model.
D. A remote authentication dial in user server.
Answer: B
Question #8 (Topic: Topic 1)
The three classic ways of authenticating yourself to the computer security software are by
something you know, by something you have, and by something:
something you know, by something you have, and by something:
A. you need.
B. non-trivial
C. you are.
D. you can get.
Answer: C
Question #9 (Topic: Topic 1)
A timely review of system access audit records would be an example of which of the basic
security functions?
security functions?
A. avoidance.
B. deterrence.
C. prevention.
D. detection.
Answer: D
Question #10 (Topic: Topic 1)
A confidential number used as an authentication factor to verify a user's identity is called a:
A. PIN
B. User ID
C. Password
D. Challenge
Answer: A