Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 65

Which of the following determines that the product developed meets the projects goals?

A.

verification

B.

validation

C.

concurrence

D.

accuracy

Full Access
Question # 66

What prevents a process from accessing another process' data?

A.

Memory segmentation

B.

Process isolation

C.

The reference monitor

D.

Data hiding

Full Access
Question # 67

What is one disadvantage of content-dependent protection of information?

A.

It increases processing overhead.

B.

It requires additional password entry.

C.

It exposes the system to data locking.

D.

It limits the user's individual address space.

Full Access
Question # 68

Which of the following is the FIRST step in protecting data's confidentiality?

A.

Install a firewall

B.

Implement encryption

C.

Identify which information is sensitive

D.

Review all user access rights

Full Access
Question # 69

Which of the following biometric devices has the lowest user acceptance level?

A.

Retina Scan

B.

Fingerprint scan

C.

Hand geometry

D.

Signature recognition

Full Access
Question # 70

Which of the following is NOT part of the Kerberos authentication protocol?

A.

Symmetric key cryptography

B.

Authentication service (AS)

C.

Principals

D.

Public Key

Full Access
Question # 71

Which of the following statements pertaining to access control is false?

A.

Users should only access data on a need-to-know basis.

B.

If access is not explicitly denied, it should be implicitly allowed.

C.

Access rights should be granted based on the level of trust a company has on a subject.

D.

Roles can be an efficient way to assign rights to a type of user who performs certain tasks.

Full Access
Question # 72

Which of the following is true about Kerberos?

A.

It utilizes public key cryptography.

B.

It encrypts data after a ticket is granted, but passwords are exchanged in plain text.

C.

It depends upon symmetric ciphers.

D.

It is a second party authentication system.

Full Access
Go to page: