SSCP Exam Questions

Total 1048 Questions

Last Updated Exam : 16-Dec-2024

Topic 1: Access Control

In an organization where there are frequent personnel changes, non-discretionary access
control using Role Based Access Control (RBAC) is useful because:


A.

 people need not use discretion


B.

 the access controls are based on the individual's role or title within the organization.


C.

the access controls are not based on the individual's role or title within the organization


D.

the access controls are often based on the individual's role or title within the
organization





B.
  

 the access controls are based on the individual's role or title within the organization.



In an organization where there are frequent personnel changes, nondiscretionary
access control (also called Role Based Access Control) is useful because the
access controls are based on the individual's role or title within the organization. You can
easily configure a new employee acces by assigning the user to a role that has been
predefine. The user will implicitly inherit the permissions of the role by being a member of
that role.
These access permissions defined within the role do not need to be changed whenever a
new person takes over the role.
Another type of non-discretionary access control model is the Rule Based Access Control
(RBAC or RuBAC) where a global set of rule is uniformly applied to all subjects accessing
the resources. A good example of RuBAC would be a firewall.
This question is a sneaky one, one of the choice has only one added word to it which is
often. Reading questions and their choices very carefully is a must for the real exam.
Reading it twice if needed is recommended shon
Shon Harris in her book list the following ways of managing RBAC:
Role-based access control can be managed in the following ways:
Non-RBAC Users are mapped directly to applications and no roles are used. (No roles
being used)
Limited RBAC Users are mapped to multiple roles and mapped directly to other types of

applications that do not have role-based access functionality. (A mix of roles for
applications that supports roles and explicit access control would be used for applications
that do not support roles)
Hybrid RBAC Users are mapped to multiapplication roles with only selected rights assigned
to those roles.
Full RBAC Users are mapped to enterprise roles. (Roles are used for all access being
granted)
NIST defines RBAC as:
Security administration can be costly and prone to error because administrators usually
specify access control lists for each user on the system individually. With RBAC, security is managed at a level that corresponds closely to the organization's structure. Each user is
assigned one or more roles, and each role is assigned one or more privileges that are
permitted to users in that role. Security administration with RBAC consists of determining
the operations that must be executed by persons in particular jobs, and assigning
employees to the proper roles. Complexities introduced by mutually exclusive roles or role
hierarchies are handled by the RBAC software, making security administration easier.
Reference(s) used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten
Domains of Computer Security, 2001, John Wiley & Sons, Page 32.
and
Harris, Shon (2012-10-25). CISSP All-in-One Exam Guide, 6th Edition McGraw-Hill.
and
http://csrc.nist.gov/groups/SNS/rbac/

 

Which of the following statements pertaining to the Bell-LaPadula is TRUE if you are NOT
making use of the strong star property?


A.

It allows "read up."



B.

 It addresses covert channels.


C.

 It addresses management of access controls.


D.

It allows "write up."





D.
  

It allows "write up."



Bell–LaPadula Confidentiality Model10 The Bell–LaPadula model is perhaps
the most well-known and significant security model, in addition to being one of the oldest
models used in the creation of modern secure computing systems. Like the Trusted
Computer System Evaluation Criteria (or TCSEC), it was inspired by early U.S. Department
of Defense security policies and the need to prove that confidentiality could be maintained.
In other words, its primary goal is to prevent disclosure as the model system moves from
one state (one point in time) to another.
When the strong star property is not being used it means that both the property and the
Simple Security Property rules would be applied.
The Star (*) property rule of the Bell-LaPadula model says that subjects cannot write down,
this would compromise the confidentiality of the information if someone at the secret layer
would write the object down to a confidential container for example.
The Simple Security Property rule states that the subject cannot read up which means that
a subject at the secret layer would not be able to access objects at Top Secret for example You must remember: The model tells you about are NOT allowed to do. Anything else
would be allowed. For example within the Bell LaPadula model you would be allowed to
write up as it does not compromise the security of the information. In fact it would upgrade
it to the point that you could lock yourself out of your own information if you have only a
secret security clearance.
The following are incorrect answers because they are all FALSE:
"It allows read up" is incorrect. The "simple security" property forbids read up.
"It addresses covert channels" is incorrect. Covert channels are not addressed by the Bell- LaPadula model.
"It addresses management of access controls" is incorrect. Management of access controls
are beyond the scope of the Bell-LaPadula model.
Reference(s) used for this question:
Hernandez CISSP, Steven (2012-12-21). Official (ISC)2 Guide to the CISSP CBK, Third
Edition ((ISC)2 Press) (Kindle Locations 17595-17600). Auerbach Publications. Kindle
Edition.

Why should batch files and scripts be stored in a protected area?


A.

Because of the least privilege concept.




B.

 Because they cannot be accessed by operators.


C.

Because they may contain credentials.


D.

Because of the need-to-know concept.





C.
  

Because they may contain credentials.



Because scripts contain credentials, they must be stored in a protected area
and the transmission of the scripts must be dealt with carefully. Operators might need
access to batch files and scripts. The least privilege concept requires that each subject in a
system be granted the most restrictive set of privileges needed for the performance of
authorized tasks. The need-to-know principle requires a user having necessity for access
to, knowledge of, or possession of specific information required to perform official tasks or
services.
Source: WALLHOFF, John, CISSP Summary 2002, April 2002, CBK#1 Access Control
System & Methodology (page 3)

What is called an automated means of identifying or authenticating the identity of a living
person based on physiological or behavioral characteristics?


A.

Biometrics




B.

 Micrometrics


C.

Macrometrics


D.

 MicroBiometrics





A.
  

Biometrics





The Answer: Biometrics; Biometrics are defined as an automated means of
identifying or authenticating the identity of a living person based on physiological or
behavioral characteristics.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Pages 37,38.

What is called the percentage of valid subjects that are falsely rejected by a Biometric
Authentication system?


A.

False Rejection Rate (FRR) or Type I Error



B.

 False Acceptance Rate (FAR) or Type II Error


C.

Crossover Error Rate (CER)


D.

True Rejection Rate (TRR) or Type III Error





A.
  

False Rejection Rate (FRR) or Type I Error




The percentage of valid subjects that are falsely rejected is called the False
Rejection Rate (FRR) or Type I Error.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the
Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 38

Which type of control is concerned with avoiding occurrences of risks?


A.

Deterrent controls


B.

Detective controls


C.

Preventive controls


D.

Compensating controls





C.
  

Preventive controls



Preventive controls are concerned with avoiding occurrences of risks while
deterrent controls are concerned with discouraging violations. Detecting controls identify
occurrences and compensating controls are alternative controls, used to compensate
weaknesses in other controls. Supervision is an example of compensating control.
Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.

Which of the following exemplifies proper separation of duties?


A.

Operators are not permitted modify the system time.




B.

Programmers are permitted to use the system console.


C.

Console operators are permitted to mount tapes and disks.


D.

Tape operators are permitted to use the system console.





A.
  

Operators are not permitted modify the system time.





This is an example of Separation of Duties because operators are prevented
from modifying the system time which could lead to fraud. Tasks of this nature should be
performed by they system administrators.
AIO defines Separation of Duties as a security principle that splits up a critical task among
two or more individuals to ensure that one person cannot complete a risky task by himself.
The following answers are incorrect:
Programmers are permitted to use the system console. Is incorrect because programmers
should not be permitted to use the system console, this task should be performed by
operators. Allowing programmers access to the system console could allow fraud to occur
so this is not an example of Separation of Duties..
Console operators are permitted to mount tapes and disks. Is incorrect because operators should be able to mount tapes and disks so this is not an example of Separation of Duties.
Tape operators are permitted to use the system console. Is incorrect because operators
should be able to use the system console so this is not an example of Separation of Duties.                     References:
OIG CBK Access Control (page 98 - 101)
AIOv3 Access Control (page 182)

What mechanism automatically causes an alarm originating in a data center to be
transmitted over the local municipal fire or police alarm circuits for relaying to both the local
police/fire station and the appropriate headquarters?


A.

Central station alarm




B.

Proprietary alarm


C.

A remote station alarm


D.

An auxiliary station alarm





D.
  

An auxiliary station alarm



Explanation: Auxiliary station alarms automatically cause an alarm originating in a data
center to be transmitted over the local municipal fire or police alarm circuits for relaying to
both the local police/fire station and the appropriate headquarters. They are usually
Municipal Fire Alarm Boxes are installed at your business or building, they are wired
directly into the fire station.
Central station alarms are operated by private security organizations. It is very similar to a
proprietary alarm system (see below). However, the biggest difference is the monitoring
and receiving of alarm is done off site at a central location manned by non staff members. It
is a third party.Proprietary alarms are similar to central stations alarms except that monitoring is performed
directly on the protected property. This type of alarm is usually use to protect large
industrials or commercial buildings. Each of the buildings in the same vincinity has their
own alarm system, they are all wired together at a central location within one of the building
acting as a common receiving point. This point is usually far away from the other building
so it is not under the same danger. It is usually man 24 hours a day by a trained team who
knows how to react under different conditions.A remote station alarm is a direct connection between the signal-initiating device at the
protected property and the signal-receiving device located at a remote station, such as the
fire station or usually a monitoring service. This is the most popular type of implementation
and the owner of the premise must pay a monthly monitoring fee. This is what most people
use in their home where they get a company like ADT to receive the alarms on their behalf.
A remote system differs from an auxiliary system in that it does not use the municipal fire of
police alarm circuits.                                                                                                                                             Reference(s) used for this question:
ANDRESS, Mandy, Exam Cram CISSP, Coriolis, 2001, Chapter 11: Physical Security (page 211).
and
Great presentation J.T.A. Stone on SlideShare

What is one disadvantage of content-dependent protection of information?





A.

It increases processing overhead.


B.

It requires additional password entry.


C.

It exposes the system to data locking.


D.

It limits the user's individual address space.





A.
  

It increases processing overhead.



Source: TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.

Examples of types of physical access controls include all EXCEPT which of the following?


A.

badges




B.

locks


C.

 guards


D.

passwords





D.
  

passwords



Passwords are considered a Preventive/Technical (logical) control.
The following answers are incorrect:
badges Badges are a physical control used to identify an individual. A badge can include a
smart device which can be used for authentication and thus a Technical control, but the
actual badge itself is primarily a physical control locks Locks are a Preventative Physical control and has no Technical association.
guards Guards are a Preventative Physical control and has no Technical association.
The following reference(s) were/was used to create this question:
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the
Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 2: Access control
systems (page 35).