Free SSCP Exam Braindumps (page: 37)

Page 36 of 269

Which of the following statements pertaining to biometrics is false?

  1. Increased system sensitivity can cause a higher false rejection rate
  2. The crossover error rate is the point at which false rejection rate equals the false acceptance rate.
  3. False acceptance rate is also known as Type II error.
  4. Biometrics are based on the Type 2 authentication mechanism.

Answer(s): D

Explanation:

Authentication is based on three factor types: type 1 is something you know, type 2 is something you have and type 3 is something you are. Biometrics are based on the Type 3 authentication mechanism.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 37).



Which of the following statements pertaining to Kerberos is TRUE?

  1. Kerberos does not address availability
  2. Kerberos does not address integrity
  3. Kerberos does not make use of Symmetric Keys
  4. Kerberos cannot address confidentiality of information

Answer(s): A

Explanation:

The question was asking for a TRUE statement and the only correct statement is "Kerberos does not address availability".
Kerberos addresses the confidentiality and integrity of information. It does not directly address availability.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 42).



Which of the following centralized access control mechanisms is the least appropriate for mobile workers accessing the corporate network over analog lines?

  1. TACACS
  2. Call-back
  3. CHAP
  4. RADIUS

Answer(s): B

Explanation:

Call-back allows for a distant user connecting into a system to be called back at a number already listed in a database of trusted users. The disadvantage of this system is that the user must be at a fixed location whose phone number is known to the authentication server. Being mobile workers, users are accessing the system from multiple locations, making call-back inappropriate for them.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 44).



Which of the following is NOT a compensating measure for access violations?

  1. Backups
  2. Business continuity planning
  3. Insurance
  4. Security awareness

Answer(s): D

Explanation:

Security awareness is a preventive measure, not a compensating measure for access violations.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 50).






Post your Comments and Discuss ISC SSCP exam with other Community members:

SSCP Discussions & Posts