Free SSCP Exam Braindumps (page: 66)

Page 65 of 269

Which of the following exemplifies proper separation of duties?

  1. Operators are not permitted modify the system time.
  2. Programmers are permitted to use the system console.
  3. Console operators are permitted to mount tapes and disks.
  4. Tape operators are permitted to use the system console.

Answer(s): A

Explanation:

This is an example of Separation of Duties because operators are prevented from modifying the system time which could lead to fraud. Tasks of this nature should be performed by they system administrators.
AIO defines Separation of Duties as a security principle that splits up a critical task among two or more individuals to ensure that one person cannot complete a risky task by himself.
The following answers are incorrect:
Programmers are permitted to use the system console. Is incorrect because programmers should not be permitted to use the system console, this task should be performed by operators. Allowing programmers access to the system console could allow fraud to occur so this is not an example of Separation of Duties..
Console operators are permitted to mount tapes and disks. Is incorrect because operators should be able to mount tapes and disks so this is not an example of Separation of Duties.
Tape operators are permitted to use the system console. Is incorrect because operators should be able to use the system console so this is not an example of Separation of Duties.


Reference:

OIG CBK Access Control (page 98 - 101)
AIOv3 Access Control (page 182)



The control of communications test equipment should be clearly addressed by security policy for which of the following reasons?

  1. Test equipment is easily damaged.
  2. Test equipment can be used to browse information passing on a network.
  3. Test equipment is difficult to replace if lost or stolen.
  4. Test equipment must always be available for the maintenance personnel.

Answer(s): B

Explanation:

Test equipment must be secured. There are equipment and other tools that if in the wrong hands could be used to "sniff" network traffic and also be used to commit fraud. The storage and use of this equipment should be detailed in the security policy for this reason.
The following answers are incorrect:
Test equipment is easily damaged. Is incorrect because it is not the best answer, and from a security point of view not relevent.
Test equipment is difficult to replace if lost or stolen. Is incorrect because it is not the best answer, and from a security point of view not relevent.
Test equipment must always be available for the maintenance personnel. Is incorrect because it is not the best answer, and from a security point of view not relevent.


Reference:

OIG CBK Operations Security (pages 642 - 643)



Who is ultimately responsible for the security of computer based information systems within an organization?

  1. The tech support team
  2. The Operation Team.
  3. The management team.
  4. The training team.

Answer(s): C

Explanation:

If there is no support by management to implement, execute, and enforce security policies and procedure, then they won't work. Senior management must be involved in this because they have an obligation to the organization to protect the assests . The requirement here is for management to show "due diligence" in establishing an effective compliance, or security program.
The following answers are incorrect:
The tech support team. Is incorrect because the ultimate responsibility is with management for the security of computer-based information systems.
The Operation Team. Is incorrect because the ultimate responsibility is with management for the security of computer-based information systems.
The Training Team. Is incorrect because the ultimate responsibility is with management for the security of computer-based information systems.


Reference:

OIG CBK Information Security Management and Risk Management (page 20 - 22)



The major objective of system configuration management is which of the following?

  1. system maintenance.
  2. system stability.
  3. system operations.
  4. system tracking.

Answer(s): B

Explanation:

A major objective with Configuration Management is stability. The changes to the system are controlled so that they don't lead to weaknesses or faults in th system.
The following answers are incorrect:
system maintenance. Is incorrect because it is not the best answer. Configuration Management does control the changes to the system but it is not as important as the overall stability of the system.
system operations. Is incorrect because it is not the best answer, the overall stability of the system is much more important.
system tracking. Is incorrect because while tracking changes is important, it is not the best answer. The overall stability of the system is much more important.






Post your Comments and Discuss ISC SSCP exam with other Community members:

SSCP Exam Discussions & Posts