Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 57

Who first described the DoD multilevel military security policy in abstract, formal terms?

A.

David Bell and Leonard LaPadula

B.

Rivest, Shamir and Adleman

C.

Whitfield Diffie and Martin Hellman

D.

David Clark and David Wilson

Full Access
Question # 58

In Discretionary Access Control the subject has authority, within certain limitations,

A.

but he is not permitted to specify what objects can be accessible and so we need to get an independent third party to specify what objects can be accessible.

B.

to specify what objects can be accessible.

C.

to specify on a aggregate basis without understanding what objects can be accessible.

D.

to specify in full detail what objects can be accessible.

Full Access
Question # 59

Which type of password token involves time synchronization?

A.

Static password tokens

B.

Synchronous dynamic password tokens

C.

Asynchronous dynamic password tokens

D.

Challenge-response tokens

Full Access
Question # 60

The National Institute of Standards and Technology (NIST) standard pertaining to perimeter protection states that critical areas should be illuminated up to?

A.

Illiminated at nine feet high with at least three foot-candles

B.

Illiminated at eight feet high with at least three foot-candles

C.

Illiminated at eight feet high with at least two foot-candles

D.

Illuminated at nine feet high with at least two foot-candles

Full Access
Question # 61

How often should a Business Continuity Plan be reviewed?

A.

At least once a month

B.

At least every six months

C.

At least once a year

D.

At least Quarterly

Full Access
Question # 62

In an organization, an Information Technology security function should:

A.

Be a function within the information systems function of an organization.

B.

Report directly to a specialized business unit such as legal, corporate security or insurance.

C.

Be lead by a Chief Security Officer and report directly to the CEO.

D.

Be independent but report to the Information Systems function.

Full Access
Question # 63

Which of the following would best describe the difference between white-box testing and black-box testing?

A.

White-box testing is performed by an independent programmer team.

B.

Black-box testing uses the bottom-up approach.

C.

White-box testing examines the program internal logical structure.

D.

Black-box testing involves the business units

Full Access
Question # 64

Which of the following types of Intrusion Detection Systems uses behavioral characteristics of a system’s operation or network traffic to draw conclusions on whether the traffic represents a risk to the network or host?

A.

Network-based ID systems.

B.

Anomaly Detection.

C.

Host-based ID systems.

D.

Signature Analysis.

Full Access
Go to page: