Free SSCP Braindumps

B. Programmers are permitted to use the system console.
C. Console operators are permitted to mount tapes and disks.
D. Tape operators are permitted to use the system console.
Answer(s): A
Explanation:
This is an example of Separation of Duties because operators are prevented from
modifying the system time which could lead to fraud. Tasks of this nature should be performed
by they system administrators.
AIO defines Separation of Duties as a security principle that splits up a critical task among two
or more individuals to ensure that one person cannot complete a risky task by himself.
The following answers are incorrect:
Programmers are permitted to use the system console. Is incorrect because programmers
should not be permitted to use the system console, this task should be performed by operators.
Al owing programmers access to the system console could allow fraud to occur so this is not an
example of Separation of Duties..
Console operators are permitted to mount tapes and disks. Is incorrect because operators
should be able to mount tapes and disks so this is not an example of Separation of Duties.
Tape operators are permitted to use the system console. Is incorrect because operators should
be able to use the system console so this is not an example of Separation of Duties.
Reference:
OIG CBK Access Control (page 98 - 101)
AIOv3 Access Control (page 182)

QUESTION: 12

Which of the following is not a logical control when implementing logical access security?

A. access profiles.
B. userids.
C. employee badges.
D. passwords.
Answer(s): C
Explanation:
Employee badges are considered Physical so would not be a logical control.
The following answers are incorrect:
userids. Is incorrect because userids are a type of logical control. access profiles. Is incorrect
because access profiles are a type of logical control. passwords. Is incorrect because
passwords are a type of logical control.

QUESTION: 13

Which one of the following authentication mechanisms creates a problem for mobile users?

A. Mechanisms based on IP addresses
B. Mechanism with reusable passwords
C. one-time password mechanism.
D. chal enge response mechanism.

Get The Premium Version

Allbraindumps.com
 Test Questions PDF from Myitguides.com

 Test Questions PDF from Myitguides.com