Free SSCP Exam Braindumps

Pass your System Security Certified Practitioner (SSCP) exam with these free Questions and Answers

Page 31 of 215
QUESTION 146

- (Topic 1)
Which of the following access control models requires defining classification for objects?

  1. A. Role-based access control
  2. B. Discretionary access control
  3. C. Identity-based access control
  4. D. Mandatory access control

Correct Answer: D
With mandatory access control (MAC), the authorization of a subject's access to an object is dependant upon labels, which indicate the subject's clearance, and classification of objects.
The Following answers were incorrect:
Identity-based Access Control is a type of Discretionary Access Control (DAC), they are synonymous.
Role Based Access Control (RBAC) and Rule Based Access Control (RuBAC or RBAC) are types of Non Discretionary Access Control (NDAC).
Tip:
When you have two answers that are synonymous they are not the right choice for sure.
There is only one access control model that makes use of Label, Clearances, and Categories, it is Mandatory Access Control, none of the other one makes use of those items.
Reference(s) used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page 33).

QUESTION 147

- (Topic 2)
What can be described as an imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?

  1. A. The security kernel
  2. B. The reference monitor
  3. C. The security perimeter
  4. D. The reference perimeter

Correct Answer: C
The security perimeter is the imaginary line that separates the trusted components of the kernel and the Trusted Computing Base (TCB) from those elements that are not trusted. The reference monitor is an abstract machine that mediates all accesses to objects by subjects. The security kernel can be software, firmware or hardware components in a trusted system and is the actual instantiation of the reference monitor. The reference perimeter is not defined and is a distracter.
Source: HARE, Chris, Security Architecture and Models, Area 6 CISSP Open Study Guide, January 2002.

QUESTION 148

- (Topic 2)
Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle?

  1. A. Pipelining
  2. B. Reduced Instruction Set Computers (RISC)
  3. C. Complex Instruction Set Computers (CISC)
  4. D. Scalar processors

Correct Answer: C
Complex Instruction Set Computer (CISC) uses instructions that perform many operations per instruction. It was based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle. Therefore, by packing more operations into an instruction, the number of fetches could be reduced. Pipelining involves overlapping the steps of different instructions to increase the performance in a computer. Reduced Instruction Set Computers (RISC) involve simpler instructions that require fewer clock cycles to execute. Scalar processors are processors that execute one instruction at a time. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 5: Security Architectures and Models (page 188).

QUESTION 149

- (Topic 6)
A server cluster looks like a:

  1. A. single server from the user's point of view
  2. B. dual server from the user's point of view
  3. C. triple server from the user's point of view
  4. D. quardle server from the user's point of view

Correct Answer: A
The cluster looks like a single server from the user's point of view. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 67.

QUESTION 150

- (Topic 4)
Which of the following backup methods is most appropriate for off-site archiving?

  1. A. Incremental backup method
  2. B. Off-site backup method
  3. C. Full backup method
  4. D. Differential backup method

Correct Answer: C
The full backup makes a complete backup of every file on the system every time it is run. Since a single backup set is needed to perform a full restore, it is appropriate for off-site archiving.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 69).

Page 31 of 215

Post your Comments and Discuss ISC2 SSCP exam with other Community members: