SSCP Practice Test Questions

1048 Questions


Topic 1: Access Control

Which of the following is the WEAKEST authentication mechanism?


A.

 Passphrases




B.

Passwords


C.

One-time passwords


D.

Token devices





B.
  

Passwords



Most of the time users usually choose passwords which can be guessed ,
hence passwords is the BEST answer out of the choices listed above.
The following answers are incorrect because :
Passphrases is incorrect as it is more secure than a password because it is longer.
One-time passwords is incorrect as the name states , it is good for only once and cannot
be reused.
Token devices is incorrect as this is also a password generator and is an one time
password mechanism.
Reference : Shon Harris AIO v3 , Chapter-4 : Access Control , Page : 139 , 142.

Which of the following security models does NOT concern itself with the flow of data?


A.

The information flow model


B.

The Biba model


C.

The Bell-LaPadula model


D.

The noninterference model





D.
  

The noninterference model



The goal of a noninterference model is to strictly separate differing security
levels to assure that higher-level actions do not determine what lower-level users can see.
This is in contrast to other security models that control information flows between differing
levels of users, By maintaining strict separation of security levels, a noninterference model
minimizes leakages that might happen through a covert channel.
The Bell-LaPadula model is incorrect. The Bell-LaPadula model is concerned with
confidentiality and bases access control decsions on the classfication of objects and the
clearences of subjects.
The information flow model is incorrect. The information flow models have a similar
framework to the Bell-LaPadula model and control how information may flow between
objects based on security classes.
The Biba model is incorrect. The Biba model is concerned with integrity and is a
complement to the Bell-LaPadula model in that higher levels of integrity are more trusted than lower levels. Access control us based on these integrity levels to assure that
read/write operations do not decrease an object's integrity.
References:
CBK, pp 325 - 326
AIO3, pp. 290 - 291

Which is the last line of defense in a physical security sense?


A.

 people




B.

 interior barriers


C.

exterior barriers


D.

perimeter barriers





A.
  

 people





"Ultimately, people are the last line of defense for your company’s assets"
(Pastore & Dulaney, 2006, p. 529).
Pastore, M. and Dulaney, E. (2006). CompTIA Security+ study guide: Exam SY0-101.
Indianapolis, IN: Sybex

Which security model is based on the military classification of data and people with
clearances?


A.

. Brewer-Nash model




B.

Clark-Wilson model


C.

 Bell-LaPadula model


D.

Biba model





C.
  

 Bell-LaPadula model



The Bell-LaPadula model is a confidentiality model for information security
based on the military classification of data, on people with clearances and data with a
classification or sensitivity model. The Biba, Clark-Wilson and Brewer-Nash models are
concerned with integrity.
Source: HARE, Chris, Security Architecture and Models, Area 6 CISSP Open Study Guide,
January 2002.

Which of the following is NOT a system-sensing wireless proximity card?


A.

magnetically striped card



B.

passive device


C.

field-powered device


D.

transponder





A.
  

magnetically striped card




Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, page 342.

Which of the following are not Remote Access concerns?


A.

Justification for remote access




B.

 Auditing of activities


C.

Regular review of access privileges


D.

Access badges





D.
  

Access badges



Access badges are more relevant to physical security rather than remote
access.
"Justification for remote access" is incorrect. Justification for remote access is a relevant
concern.
"Auditing of activities" is incorrect. Auditing of activites is an imporant aspect to assure that
malicious or unauthorized activities are not occuring.
"Regular review of access privileges" is incorrect. Regular review of remote accept
privileges is an important management responsibility.
References:
AIO3, pp. 547 - 548

What is called the percentage at which the False Rejection Rate equals the False
Acceptance Rate?


A.

False Rejection Rate (FRR) or Type I Error


B.

False Acceptance Rate (FAR) or Type II Error



C.

Crossover Error Rate (CER)


D.

Failure to enroll rate (FTE or FER)





C.
  

Crossover Error Rate (CER)



The percentage at which the False Rejection Rate equals the False
Acceptance Rate is called the Crossover Error Rate (CER). Another name for the CER is
the Equal Error Rate (EER), any of the two terms could be used.
Equal error rate or crossover error rate (EER or CER)
It is the rate at which both accept and reject errors are equal. The EER is a quick way to
compare the accuracy of devices with different ROC curves. In general, the device with the
lowest EER is most accurate.
The other choices were all wrong answers:
The following are used as performance metrics for biometric systems:
false accept rate or false match rate (FAR or FMR): the probability that the system
incorrectly matches the input pattern to a non-matching template in the database. It
measures the percent of invalid inputs which are incorrectly accepted. This is when an
impostor would be accepted by the system. False reject rate or false non-match rate (FRR or FNMR): the probability that the system
fails to detect a match between the input pattern and a matching template in the database.
It measures the percent of valid inputs which are incorrectly rejected. This is when a valid
company employee would be rejected by the system.
Failure to enroll rate (FTE or FER): the rate at which attempts to create a template from an
input is unsuccessful. This is most commonly caused by low quality inputs.
Reference(s) used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten
Domains of Computer Security, 2001, John Wiley & Sons, Page 38.
and
https://en.wikipedia.org/wiki/Biometrics

Which of the following is true about Kerberos?


A.

 It utilizes public key cryptography.




B.

It encrypts data after a ticket is granted, but passwords are exchanged in plain text.


C.

It depends upon symmetric ciphers.


D.

It is a second party authentication system





C.
  

It depends upon symmetric ciphers.



Kerberos depends on secret keys (symmetric ciphers). Kerberos is a third
party authentication protocol. It was designed and developed in the mid 1980's by MIT. It is
considered open source but is copyrighted and owned by MIT. It relies on the user's secret
keys. The password is used to encrypt and decrypt the keys.
The following answers are incorrect:
It utilizes public key cryptography. Is incorrect because Kerberos depends on secret keys
(symmetric ciphers).
It encrypts data after a ticket is granted, but passwords are exchanged in plain text. Is
incorrect because the passwords are not exchanged but used for encryption and
decryption of the keys.
It is a second party authentication system. Is incorrect because Kerberos is a third party
authentication system, you authenticate to the third party (Kerberos) and not the system
you are accessing.
References:                                                                                                                                                                MIT http://web.mit.edu/kerberos/
Wikipedi http://en.wikipedia.org/wiki/Kerberos_%28protocol%29
OIG CBK Access Control (pages 181 - 184)
AIOv3 Access Control (pages 151 - 155)

Crime Prevention Through Environmental Design (CPTED) is a discipline that:


A.

AOutlines how the proper design of a physical environment can reduce crime by directly
affecting human behavior.



B.

Outlines how the proper design of the logical environment can reduce crime by directly
affecting human behavior.


C.

 Outlines how the proper design of the detective control environment can reduce crime
by directly affecting human behavior.


D.

Outlines how the proper design of the administrative control environment can reduce
crime by directly affecting human behavior





A.
  

AOutlines how the proper design of a physical environment can reduce crime by directly
affecting human behavior.




Crime Prevention Through Environmental Design (CPTED) is a discipline
that outlines how the proper design of a physical environment can reduce crime by directly
affecting human behavior. It provides guidance about lost and crime prevention through
proper facility contruction and environmental components and procedures.
CPTED concepts were developed in the 1960s. They have been expanded upon and have
matured as our environments and crime types have evolved. CPTED has been used not
just to develop corporate physical security programs, but also for large-scale activities such
as development of neighborhoods, towns, and cities. It addresses landscaping, entrances,
facility and neighborhood layouts, lighting, road placement, and traffic circulation patterns.
It looks at microenvironments, such as offices and rest-rooms, and macroenvironments,
like campuses and cities.
Reference(s) used for this question:
Harris, Shon (2012-10-18). CISSP All-in-One Exam Guide, 6th Edition (p. 435). McGraw-
Hill. Kindle Edition.and
CPTED Guide Book

Which of the following best ensures accountability of users for the actions taken within a
system or domain?


A.

Identification



B.

Authentication


C.

Authorization


D.

Credentials





B.
  

Authentication



The only way to ensure accountability is if the subject is uniquely identified and
authenticated. Identification alone does not provide proof the user is who they claim to be.
After showing proper credentials, a user is authorized access to resources.
References:
HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002,
Chapter 4: Access Control (page 126).

Which of the following protocol was used by the INITIAL version of the Terminal Access
Controller Access Control System TACACS for communication between clients and
servers?


A.

TCP




B.

 SSL


C.

UDP


D.

SSH





C.
  

UDP



The original TACACS, developed in the early ARPANet days, had very
limited functionality and used the UDP transport. In the early 1990s, the protocol was
extended to include additional functionality and the transport changed to TCP.
TACACS is defined in RFC 1492, and uses (either TCP or UDP) port 49 by default.
TACACS allows a client to accept a username and password and send a query to a
TACACS authentication server, sometimes called a TACACS daemon or simply
TACACSD. TACACSD uses TCP and usually runs on port 49. It would determine whether
to accept or deny the authentication request and send a response back.
TACACS+
TACACS+ and RADIUS have generally replaced TACACS and XTACACS in more recently built or updated networks. TACACS+ is an entirely new protocol and is not compatible with
TACACS or XTACACS. TACACS+ uses the Transmission Control Protocol (TCP) and
RADIUS uses the User Datagram Protocol (UDP). Since TCP is connection oriented
protocol, TACACS+ does not have to implement transmission control. RADIUS, however,
does have to detect and correct transmission errors like packet loss, timeout etc. since it
rides on UDP which is connectionless.
RADIUS encrypts only the users' password as it travels from the RADIUS client to RADIUS
server. All other information such as the username, authorization, accounting are
transmitted in clear text. Therefore it is vulnerable to different types of attacks. TACACS+
encrypts all the information mentioned above and therefore does not have the
vulnerabilities present in the RADIUS protocol.
RADIUS and TACACS + are client/ server protocols, which means the server portion
cannot send unsolicited commands to the client portion. The server portion can only speak
when spoken to. Diameter is a peer-based protocol that allows either end to initiate
communication. This functionality allows the Diameter server to send a message to the access server to request the user to provide another authentication credential if she is
attempting to access a secure resource.
Reference(s) used for this question:
http://en.wikipedia.org/wiki/TACACS
and
Harris, Shon (2012-10-18). CISSP All-in-One Exam Guide, 6th Edition (p. 239). McGraw-
Hill. Kindle Edition.

The controls that usually require a human to evaluate the input from sensors or cameras to
determine if a real threat exists are associated with


A.

Preventive/physical



B.

Detective/technical


C.


Detective/physical


D.

Detective/administrative





C.
  


Detective/physical



Detective/physical controls usually require a human to evaluate the input
from sensors or cameras to determine if a real threat exists.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the
Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 36.


Page 18 out of 88 Pages
Previous