Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

SSCPFree trialFree trial

By isc
Aug, 2025

Verified

25Q per page

Question 26

Which of the following remote access authentication systems is the most robust?

  • A: TACACS+
  • B: RADIUS
  • C: PAP
  • D: TACACS

Question 27

What does the simple security (ss) property mean in the Bell-LaPadula model?

  • A: No read up
  • B: No write down
  • C: No read down
  • D: No write up

Question 28

Which access control model was proposed for enforcing access control in government and military applications?

  • A: Bell-LaPadula model
  • B: Biba model
  • C: Sutherland model
  • D: Brewer-Nash model

Question 29

For maximum security design, what type of fence is most effective and cost-effective method (Foot are being used as measurement unit below)?

  • A: 3' to 4' high
  • B: 6' to 7' high
  • C: 8' high and above with strands of barbed wire
  • D: Double fencing

Question 30

In Mandatory Access Control, sensitivity labels attached to object contain what information?

  • A: The item's classification
  • B: The item's classification and category set
  • C: The item's category
  • D: The items's need to know

Question 31

A department manager has read access to the salaries of the employees in his/her department but not to the salaries of employees in other departments. A database security mechanism that enforces this policy would typically be said to provide which of the following?

  • A: Content-dependent access control
  • B: Context-dependent access control
  • C: Least privileges access control
  • D: Ownership-based access control

Question 32

Which of the following is NOT a form of detective administrative control?

  • A: Rotation of duties
  • B: Required vacations
  • C: Separation of duties
  • D: Security reviews and audits

Question 33

Which TCSEC level is labeled Controlled Access Protection?

  • A: C1
  • B: C2
  • C: C3
  • D: B1

Question 34

Why should batch files and scripts be stored in a protected area?

  • A: Because of the least privilege concept.
  • B: Because they cannot be accessed by operators.
  • C: Because they may contain credentials.
  • D: Because of the need-to-know concept.

That’s the end of your free questions

You’ve reached the preview limit for SSCP

Consider upgrading to gain full access!

Page 2 of 7 • Questions 26-50 of 166

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!