Free SSCP Exam Braindumps (page: 42)

Page 41 of 269

Which of the following remote access authentication systems is the most robust?

  1. TACACS+
  2. RADIUS
  3. PAP
  4. TACACS

Answer(s): A

Explanation:

TACACS+ is a proprietary Cisco enhancement to TACACS and is more robust than RADIUS. PAP is not a remote access authentication system but a remote node security protocol.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 122).



Which of the following is an example of a passive attack?

  1. Denying services to legitimate users
  2. Shoulder surfing
  3. Brute-force password cracking
  4. Smurfing

Answer(s): B

Explanation:

Shoulder surfing is a form of a passive attack involving stealing passwords, personal identification numbers or other confidential information by looking over someone's shoulder. All other forms of attack are active attacks, where a threat makes a modification to the system in an attempt to take advantage of a vulnerability.


Reference:

HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 3: Security Management Practices (page 63).



What does the Clark-Wilson security model focus on?

  1. Confidentiality
  2. Integrity
  3. Accountability
  4. Availability

Answer(s): B

Explanation:

The Clark-Wilson model addresses integrity. It incorporates mechanisms to enforce internal and external consistency, a separation of duty, and a mandatory integrity policy.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 5: Security Architectures and Models (page 205).



What does the simple security (ss) property mean in the Bell-LaPadula model?

  1. No read up
  2. No write down
  3. No read down
  4. No write up

Answer(s): A

Explanation:

The ss (simple security) property of the Bell-LaPadula access control model states that reading of information by a subject at a lower sensitivity level from an object at a higher sensitivity level is not permitted (no read up).


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 5: Security Architectures and Models (page 202).






Post your Comments and Discuss ISC SSCP exam with other Community members:

SSCP Discussions & Posts