Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 105

Who is responsible for implementing user clearances in computer-based information systems at the B3 level of the TCSEC rating ?

A.

Security administrators

B.

Operators

C.

Data owners

D.

Data custodians

Full Access
Question # 106

Which of the following are required for Life-Cycle Assurance?

A.

System Architecture and Design specification.

B.

Security Testing and Covert Channel Analysis.

C.

Security Testing and Trusted distribution.

D.

Configuration Management and Trusted Facility Management.

Full Access
Question # 107

Memory management in TCSEC levels B3 and A1 operating systems may utilize "data hiding". What does this mean?

A.

System functions are layered, and none of the functions in a given layer can access data outside that layer.

B.

Auditing processes and their memory addresses cannot be accessed by user processes.

C.

Only security processes are allowed to write to ring zero memory.

D.

It is a form of strong encryption cipher.

Full Access
Question # 108

Which of the following would MOST likely ensure that a system development project meets business objectives?

A.

Development and tests are run by different individuals

B.

User involvement in system specification and acceptance

C.

Development of a project plan identifying all development activities

D.

Strict deadlines and budgets

Full Access
Question # 109

Whose role is it to assign classification level to information?

A.

Security Administrator

B.

User

C.

Owner

D.

Auditor

Full Access
Question # 110

Which of the following refers to the data left on the media after the media has been erased?

A.

remanence

B.

recovery

C.

sticky bits

D.

semi-hidden

Full Access
Question # 111

Configuration Management controls what?

A.

Auditing of changes to the Trusted Computing Base.

B.

Control of changes to the Trusted Computing Base.

C.

Changes in the configuration access to the Trusted Computing Base.

D.

Auditing and controlling any changes to the Trusted Computing Base.

Full Access
Question # 112

Which of the following is NOT true concerning Application Control?

A.

It limits end users use of applications in such a way that only particular screens are visible.

B.

Only specific records can be requested through the application controls

C.

Particular usage of the application can be recorded for audit purposes

D.

It is non-transparent to the endpoint applications so changes are needed to the applications and databases involved

Full Access
Go to page: