ISC SSCP Exam Questions
SSCP System Security Certified Practitioner (SSCP) (Page 3 )

Updated On: 28-Feb-2026

Which of the following is needed for System Accountability?

  1. Audit mechanisms.
  2. Documented design as laid out in the Common Criteria.
  3. Authorization.
  4. Formal verification of system design.

Answer(s): A

Explanation:

Is a means of being able to track user actions. Through the use of audit logs and other tools the user actions are recorded and can be used at a later date to verify what actions were performed.
Accountability is the ability to identify users and to be able to track user actions.
The following answers are incorrect:
Documented design as laid out in the Common CriteriA. Is incorrect because the Common Criteria is an international standard to evaluate trust and would not be a factor in System Accountability.
Authorization. Is incorrect because Authorization is granting access to subjects, just because you have authorization does not hold the subject accountable for their actions.
Formal verification of system design. Is incorrect because all you have done is to verify the system design and have not taken any steps toward system accountability.


Reference:

OIG CBK Glossary (page 778)



What is Kerberos?

  1. A three-headed dog from the egyptian mythology.
  2. A trusted third-party authentication protocol.
  3. A security model.
  4. A remote authentication dial in user server.

Answer(s): B

Explanation:

Is correct because that is exactly what Kerberos is.
The following answers are incorrect:
A three-headed dog from Egyptian mythology. Is incorrect because we are dealing with Information Security and not the Egyptian mythology but the Greek Mythology.
A security model. Is incorrect because Kerberos is an authentication protocol and not just a security model.
A remote authentication dial in user server. Is incorrect because Kerberos is not a remote authentication dial in user server that would be called RADIUS.



The three classic ways of authenticating yourself to the computer security software are by something you know, by something you have, and by something:

  1. you need.
  2. non-trivial
  3. you are.
  4. you can get.

Answer(s): C

Explanation:

This is more commonly known as biometrics and is one of the most accurate ways to authenticate an individual.
The rest of the answers are incorrect because they not one of the three recognized forms for Authentication.



A timely review of system access audit records would be an example of which of the basic security functions?

  1. avoidance.
  2. deterrence.
  3. prevention.
  4. detection.

Answer(s): D

Explanation:

By reviewing system logs you can detect events that have occured.
The following answers are incorrect:
avoidance. This is incorrect, avoidance is a distractor. By reviewing system logs you have not avoided anything.
deterrence. This is incorrect because system logs are a history of past events. You cannot deter something that has already occurred.
prevention. This is incorrect because system logs are a history of past events. You cannot prevent something that has already occurred.



A confidential number used as an authentication factor to verify a user's identity is called a:

  1. PIN
  2. User ID
  3. Password
  4. Challenge

Answer(s): A

Explanation:

PIN Stands for Personal Identification Number, as the name states it is a combination of numbers.
The following answers are incorrect:
User ID This is incorrect because a Userid is not required to be a number and a Userid is only used to establish identity not verify it.
Password. This is incorrect because a password is not required to be a number, it could be any combination of characters.
Challenge. This is incorrect because a challenge is not defined as a number, it could be anything.



Viewing page 3 of 216
Viewing questions 11 - 15 out of 1074 questions



Post your Comments and Discuss ISC SSCP exam dumps with other Community members:

SSCP Exam Discussions & Posts

AI Tutor