Multiple Choice from the SSCP Practice Exam Questions (30 points) . Write the an
ID: 3748324 • Letter: M
Question
Multiple Choice from the SSCP Practice Exam Questions (30 points). Write the answer and a short explanation of three or four lines, as shown below:
Question 6. Who developed one of the first mathematical models of a multilevel security computer system?
A. Diffie and Hellman
B. Clark and Wilson
C. Bell and LaPadula
D. Gasser and Lipner
Answer:
Explanation:
Question 7. What physical characteristic does a retinal scan biometric device measure?
A. The amount of light reaching the retina
B. The amount of light reflected by the retina
C. The pattern of light receptors at the back of the eye
D. The pattern of blood vessels at the back of the eye.
Answer:
Explanation:
Question 8. Which is the last line of defense in a physical security sense?
A. People
B. Interior barriers
C. Exterior barriers
D. Perimeter barriers
Answer:
Explanation:
Question 9. The end result of implementing the principle of least privilege means which of the following?
A. Users would get access to only the info for which they have a need to know.
B. Users can access all systems.
C. Users get new privileges added when they change positions
D. Authorization creep
Answer:
Explanation:
Question 10. Which of the following is true of two-factor authentication?
A. It uses the RSA public-key signature based on integers with large prime factors.
B. It requires two measurements of hand geometry.
C. It does not use single sign-on technology.
D. It relies on two independent proofs of identity.
Answer:
Explanation:
Explanation / Answer
6) (C) is the correct option.
Explanation: Bell and LaPadula developed the first mathematical models of a multilevel security computer system for access information control and military applications.
7) (D) is the correct option.
Explanation: A retinal scan biometric device measure the pattern of blood vessels at the back of the eye.
8) (A) is the correct option.
Explanation: Last line of defense in physical security are the people and also the most
difficult to manage.
9) (A) is the correct option.
Explanation: The end result of implementing the principle of least privilege means user would get access to only the info for which they have a need to know.
10) (D) is the correct option.
Explanation: Two-factor authentication relies on two independent proofs of identity. It uses two independent identity proofs, i.e. something the user has like a token card and something the user knows like password. Two-factor authentication can be used with single sign-in.
Hope this helps.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.