Book Image

SSCP Systems Security Certified Practitioner Official Practice Tests

By : Mike Chapple, David Seidl
Book Image

SSCP Systems Security Certified Practitioner Official Practice Tests

By: Mike Chapple, David Seidl

Overview of this book

The SSCP certification is offered by the International Information System Security Certification Consortium (ISC)2. The SSCP is the entry-level credential in this series. With SSCP certification, you’ll meet the requirements of the Department of Defense for entry-level Information Assurance Technical (IAT I) roles, positioning you for a successful career in cybersecurity. This book's first seven chapters cover each of the seven domains on the SSCP exam with sixty or more questions per domain, so you can focus your study efforts exactly where you need more review. The book also contains two complete practice exams that you can use as time trials to assess your readiness for the SSCP and a future in the field of information assurance. By the end of the book, you would have strengthened your weak areas and reinforced your learning to ace the test and earn the certification.
Table of Contents (14 chapters)
Chapter 1 Access Controls (Domain 1)
Chapter 2 Security Operations and Administration (Domain 2)
Chapter 3 Risk Identification, Monitoring, and Analysis (Domain 3)
Chapter 4 Incident Response and Recovery (Domain 4)
Chapter 5 Cryptography (Domain 5)
Chapter 6 Network and Communications Security (Domain 6)
Chapter 7 Systems and Application Security (Domain 7)
Chapter 8 Practice Test 1
Chapter 9 Practice Test 2
End User License Agreement

Chapter 1: Access Controls (Domain 1)

  1. B. Device authentication allows the venue to restrict network access to authorized scanners but does not require individual ushers to sign in to the device. This seems an acceptable level of security for this environment, as the scanners are carefully controlled. Moving to any authentication scheme that requires user authentication would be unwieldy.

  2. D. The purpose of an extranet is to allow outside organizations that are business partners to access limited resources on the corporate network. That describes the situation in this scenario, so Norma is building an extranet.

  3. B. A mandatory access control (MAC) scheme is an example of a nondiscretionary approach to access control, as the owner of objects does not have the ability to set permissions on those objects. It is possible for a visitor list or file ACLs to be configured using a nondiscretionary scheme, but these approaches can also be configured as discretionary access control (DAC...