Free SSCP Exam Braindumps (page: 55)

Page 54 of 269

Which of the following is not a preventive login control?

  1. Last login message
  2. Password aging
  3. Minimum password length
  4. Account expiration

Answer(s): A

Explanation:

The last login message displays the last login date and time, allowing a user to discover if their account was used by someone else. Hence, this is rather a detective control.


Reference:

RUSSEL, Deborah & GANGEMI, G.T. Sr., Computer Security Basics, O'Reilly, July 1992 (page 63).



Which of the following forms of authentication would most likely apply a digital signature algorithm to every bit of data that is sent from the claimant to the verifier?

  1. Dynamic authentication
  2. Continuous authentication
  3. Encrypted authentication
  4. Robust authentication

Answer(s): B

Explanation:

Continuous authentication is a type of authentication that provides protection against impostors who can see, alter, and insert information passed between the claimant and verifier even after the claimant/verifier authentication is complete. These are typically referred to as active attacks, since they assume that the imposter can actively influence the connection between claimant and verifier. One way to provide this form of authentication is to apply a digital signature algorithm to every bit of data that is sent from the claimant to the verifier. There are other combinations of cryptography that can provide this form of authentication but current strategies rely on applying some type of cryptography to every bit of data sent. Otherwise, any unprotected bit would be suspect. Robust authentication relies on dynamic authentication data that changes with each authenticated session between a claimant and a verifier, but does not provide protection against active attacks. Encrypted authentication is a distracter.


Reference:

GUTTMAN, Barbara & BAGWILL, Robert, NIST Special Publication 800-xx, Internet Security Policy: A Technical Guide, Draft Version, May 25, 2000 (page 34).



Who first described the DoD multilevel military security policy in abstract, formal terms?

  1. David Bell and Leonard LaPadula
  2. Rivest, Shamir and Adleman
  3. Whitfield Diffie and Martin Hellman
  4. David Clark and David Wilson

Answer(s): A

Explanation:

It was David Bell and Leonard LaPadula who, in 1973, first described the DoD multilevel military security policy in abstract, formal terms. The Bell-LaPadula is a Mandatory Access Control (MAC) model concerned with confidentiality. Rivest, Shamir and Adleman (RSA) developed the RSA encryption algorithm. Whitfield Diffie and Martin Hellman published the Diffie- Hellman key agreement algorithm in 1976. David Clark and David Wilson developed the Clark- Wilson integrity model, more appropriate for security in commercial activities.


Reference:

RUSSEL, Deborah & GANGEMI, G.T. Sr., Computer Security Basics, O'Reilly, July 1992 (pages 78,109).



What is the most critical characteristic of a biometric identifying system?

  1. Perceived intrusiveness
  2. Storage requirements
  3. Accuracy
  4. Scalability

Answer(s): C

Explanation:

Accuracy is the most critical characteristic of a biometric identifying verification system.
Accuracy is measured in terms of false rejection rate (FRR, or type I errors) and false acceptance rate (FAR or type II errors).
The Crossover Error Rate (CER) is the point at which the FRR equals the FAR and has become the most important measure of biometric system accuracy.


Reference:

TIPTON, Harold F. & KRAUSE, Micki, Information Security Management Handbook, 4th edition (volume 1), 2000, CRC Press, Chapter 1, Biometric Identification (page 9).






Post your Comments and Discuss ISC SSCP exam with other Community members:

SSCP Discussions & Posts