CBT IT Certification Training

Unlimited IT Certification Courses via Streaming Video

Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
Login to this site requires ssl communication.
Click here to reload the page over ssl.

  • Lost your password?

  • Back to login
Loading
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
          • CCST – Networking
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • EC Council
          • Certified Ethical Hacker
        • Google
          • Cloud Architect
        • ITIL
          • ITIL Foundations
        • PMI
          • CAPM
        • ISC2
          • CC
          • SSCP
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • Python
          • PCEP
          • PCAP
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
        • Wireshark
          • WCNA
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets
  • Home
  • Courses
        • Amazon
          • Solutions Architect
          • SysOps Associate
        • Career
          • How to Break into IT
          • IT Freelancing
          • Ace Your IT Exams
        • Cisco
          • CCNA Primer
          • CCNA Exam Coaching
          • CCNA
          • CCNA CyberOps
          • DevNet Associate
          • CCNP – ENARSI
          • CCNP ENCOR Primer
          • CCNP – ENCOR
          • CCST – Networking
        • Coding Academy
          • PhP Fundamentals
          • MySQL Fundamentals
          • Web Development
          • Python For Beginners
        • CompTIA
          • CASP+
          • Cloud Essentials
          • CySA+
          • Data+
          • Linux+
          • Network+
          • PenTest+
          • Project+
          • Security+
        • DevOps
          • DevOps Foundations
          • Docker Basics
        • EC Council
          • Certified Ethical Hacker
        • Google
          • Cloud Architect
        • ITIL
          • ITIL Foundations
        • PMI
          • CAPM
        • ISC2
          • CC
          • SSCP
        • Juniper
          • JNCIA-Junos
          • JNCIA-SEC
          • JNCIS-ENT
          • JNCIS-SEC
        • Linux
          • CompTIA Linux+
          • Linux LPI Essentials
          • Linux LPIC-1
          • Linux LPIC-2
          • Linux LPIC-3 Security
          • Red Hat RHCSA
        • Microsoft
          • Microsoft SQL Server
          • Windows 10
          • Windows Server 2016
          • Microsoft Security
          • Azure Fundamentals
          • Azure Administrator
          • Azure Developer
        • Python
          • PCEP
          • PCAP
        • TCP-IP
          • IP Subnetting
          • IPv6 Associate
          • IPv6 Professional
          • IPv6 Expert
        • VMware
          • VCA Data Center
        • Wireless
          • CWNA
          • CWSP
        • Wireshark
          • WCNA
  • Racks
    • GNS3 VM – Virtual Cisco Rack
    • Live Cisco Racks
  • Tour
  • Blog
  • Join
  • Join
  • Free IT Training
    • Free CCNA Study and Lab Guide
    • CCNA Security Study and Lab Guide
    • CompTIA Network+ Study Guide
    • CompTIA Security+ Study Guide
    • Network Design Workbook
    • Free IT Webinars
    • Free IT Exams
    • Free Labs
  • Meet the Trainers
  • Help
    • Helpdesk
    • FAQ
    • Contact Us
    • Privacy
    • Meet the Trainers
  • Products
    • IT Study Guides
  • Start $1 Trial
  • Login
  • Members
    • Account
    • Exam Coaching
    • Exams
    • Forum
    • Live Cisco Rack Training
    • Members Training
    • Member Bonuses
    • My Courses
    • Nuggets

SSCP

Back to exams page.

Take our SSCP training course here.

loading

1. Who developed one of the first mathematical models of a multilevel-security computer system?

Question 1 of 50

2. Which of the following attacks could capture network user passwords?

Question 2 of 50

3. Examples of types of physical access controls include all EXCEPT which of the following?

Question 3 of 50

4. Which is the last line of defense in a physical security sense?

Question 4 of 50

5. The end result of implementing the principle of least privilege means which of the following?

Question 5 of 50

6. Which of the following is the most reliable, secure means of removing data from magnetic storage media such as a magnetic tape, or a cassette?

Question 6 of 50

7. Which of the following is true of two-factor authentication?

Question 7 of 50

8. The primary service provided by Kerberos is which of the following?

Question 8 of 50

9. In which of the following model are Subjects and Objects identified and the permissions applied to each subject/object combination are specified? Such a model can be used to quickly summarize what permissions a subject has for various system objects.

Question 9 of 50

10. Which of the following was developed to address some of the weaknesses in Kerberos and uses public key cryptography for the distribution of secret keys and provides additional access control support?

Question 10 of 50

11. Single Sign-on (SSO) is characterized by which of the following advantages?

Question 11 of 50

12. What kind of certificate is used to validate a user identity?

Question 12 of 50

13. Which of the following is not a physical control for physical security?

Question 13 of 50

14. Controlling access to information systems and associated networks is necessary for the preservation of their:

Question 14 of 50

15. Controls like guards and general steps to maintain building security, securing of server rooms or laptops, the protection of cables, and usage of magnetic switches on doors and windows are some of the examples of:

Question 15 of 50

16. To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:

Question 16 of 50

17. Which access control type has a central authority that determine to what objects the subjects have access to and it is based on role or on the organizational security policy?

Question 17 of 50

18. What is called the type of access control where there are pairs of elements that have the least upper bound of values and greatest lower bound of values?

Question 18 of 50

19. Technical controls such as encryption and access control can be built into the operating system, be software applications, or can be supplemental hardware/ software units. Such controls, also known as logical controls, represent which pairing?

Question 19 of 50

20. What is called the use of technologies such as fingerprint, retina, and iris scans to authenticate the individuals requesting access to resources?

Question 20 of 50

21. What are called user interfaces that limit the functions that can be selected by a user?

Question 21 of 50

22. The control measures that are intended to reveal the violations of security policy using software and hardware are associated with:

Question 22 of 50

23. The controls that usually require a human to evaluate the input from sensors or cameras to determine if a real threat exists are associated with:

Question 23 of 50

24. What is called the act of a user professing an identity to a system, usually in the form of a log-on ID?

Question 24 of 50

25. What is called the verification that the user's claimed identity is valid and is usually implemented through a user password at log-on time?

Question 25 of 50

26. Which one of the following factors is NOT one on which Authentication is based?

Question 26 of 50

27. Which type of password provides maximum security because a new password is required for each new log-on?

Question 27 of 50

28. What is called a sequence of characters that is usually longer than the allotted number for a password?

Question 28 of 50

29. Which of the following choices describe a Challenge-response tokens generation?

Question 29 of 50

30. What is called the percentage of valid subjects that are falsely rejected by a Biometric Authentication system?

Question 30 of 50

31. Which of the following is a trusted, third party authentication protocol that was developed under Project Athena at MIT?

Question 31 of 50

32. Kerberos is vulnerable to replay in which of the following circumstances?

Question 32 of 50

33. RADIUS incorporates which of the following services?

Question 33 of 50

34. The Terminal Access Controller Access Control System (TACACS) employs which of the following?

Question 34 of 50

35. Which of the following is the FIRST step in protecting data's confidentiality?

Question 35 of 50

36. Which of the following is the WEAKEST authentication mechanism?

Question 36 of 50

37. Which access control model enables the OWNER of the resource to specify what subjects can access specific resources based on their identity?

Question 37 of 50

38. Why do buffer overflows happen? What is the main cause?

Question 38 of 50

39. Which of the following are not Remote Access concerns?

Question 39 of 50

40. Which type of password token involves time synchronization?

Question 40 of 50

41. Which of the following is most affected by denial-of-service (DOS) attacks?

Question 41 of 50

42. What refers to legitimate users accessing networked services that would normally be restricted to them?

Question 42 of 50

43. In regards to information classification what is the main responsibility of information (data) owner?

Question 43 of 50

44. Which of the following is not a two-factor authentication mechanism?

Question 44 of 50

45. Which of the following would be used to implement Mandatory Access Control (MAC)?

Question 45 of 50

46. Which type of attack involves impersonating a user or a system?

Question 46 of 50

47. Which of the following is an example of a passive attack?

Question 47 of 50

48. What is the main objective of proper separation of duties?

Question 48 of 50

49. In the CIA triad, what does the letter A stand for?

Question 49 of 50

50. Almost all types of detection permit a system's sensitivity to be increased or decreased during an inspection process. If the system's sensitivity is increased, such as in a biometric authentication system, the system becomes increasingly selective and has the possibility of generating:

Question 50 of 50

Loading... Loading...

 

content-filler

ABOUT US

This site has been created to help you make the best out of your IT career. Whether you are trying to get your first job, get promoted, or start your own IT business, we have a course for you.

MOST POPULAR

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Members

  • Account
  • Forum
  • Live Cisco Rack Training
  • Members Training
  • Member Bonuses
  • My Courses

Newsletter

Subscription Form

Secure Site

website security secure

Copyright Reality Press Ltd . / Paul Browning

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.