Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

SSCP Exam Solved Correctly

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
04-02-2026
Written in
2025/2026

SSCP Exam Solved Correctly HIPAA/HITECH - Answer- Health information FERPA - Answer- Educational records GLBA - Answer- Financial services sector COPPA - Answer- Information related to children under the age of 13 Privacy Act of 1974 - Answer- Information held by federal agencies GDPR - Answer- PII of European Union residents PIPEDA - Answer- PII of Canadian residents APEC CPEA - Answer- PII of residents of Asian-Pacific nations Confidentiality - Answer- Prevents unauthorized disclosure Integrity - Answer- Prevents unauthorized alteration Availability - Answer- Ensures authorized access Accountability - Answer- Provides the ability to trace every action taken on a system back to an individual user without any ambiguity Non-repudiation - Answer- Prevents the user from denying responsibility for an action Deterrent Controls - Answer- Seek to dissuade an attacker from attempting to violate a security policy Preventative Controls - Answer- Seek to block an attempt to violate a security policy from succeeding Detective Controls - Answer- Seek to identify attack attempts that do occur Need to know - Answer- Requires a legitimate business need to access information Least privilege - Answer- Grants individuals the minimum necessary permissions to perform their jobs Separation of duties - Answer- Blocks someone from having two sensitive privileges in combination Two-person control - Answer- Requires two people to perform a sensitive activity Mandatory vacations - Answer- Seek to prevent fraudulent activity by uncovering malfeasance Corrective Controls - Answer- Seek to restore normal service after a disruption Compensating Controls - Answer- Seek to address a gap created by the absence of another required control Technical Controls - Answer- Use technological means to achieve control objectives Physical Controls - Answer- Use real-world physical means to achieve control objectives Administrative Controls - Answer- Use policy and procedure mechanisms to achieve control objectives Due care - Answer- Taking reasonable steps to protect the interest of the organization Due diligence - Answer- Ensures that reasonable steps are carried out Criminal laws - Answer- Laws that may involve prison or fines. Civil laws - Answer- Laws that regulate non-criminal disputes. Administrative laws - Answer- Laws set by government agencies. Regulations - Answer- Rules from industry bodies. Request control - Answer- Manages, evaluates, and prioritizes inbound requests from customers. Change control - Answer- Grants permission for developers to make changes to application code. Release control - Answer- Moves code from the development environment into production. Security professionals - Answer- Responsible for assessing and ensuring the organization's compliance with internal policies and external laws, regulations, and contractual obligations. Asset management systems - Answer- Track hardware, software, and data assets throughout their lifecycle. DevOps - Answer- A collaborative approach that combines software development (Dev) and IT operations (Ops) to improve the efficiency, speed, and quality of software delivery. DevSecOps - Answer- Integrates security practices into the DevOps process, ensuring that security is a shared responsibility throughout the entire software development lifecycle. Lifecycle stages - Answer- Include process, planning, design, initiation, development or acquisition, inventory and licensing, implementation and assessment, operation/maintenance/end of life, archiving and retention requirements, disposal and destruction. FRR - Answer- False Rejection Rate. FAR - Answer- False Acceptance Rate. Identification - Answer- Where a user makes a claim of identity. Authentication - Answer- Where the user proves the claim of identity. Authorization - Answer- Where the system confirms that the user is permitted to perform the requested action. CER - Answer- Crossover Error Rate. Access control systems - Answer- Seek to limit the access that subjects have to objects. Sensitivity - Answer- Refers to the level of protection required for information. Single sign-on (SSO) - Answer- Allows the use of a single account across multiple systems without requiring repeated logins. Federation - Answer- Shares account information across systems belonging to different service providers. Technical controls - Answer- Use hardware and software mechanisms, such as firewalls and intrusion prevention systems, to limit access. Physical controls - Answer- Limit physical access to controlled spaces, such as locks and keys. Administrative controls - Answer- Provide management of personnel and business practices, such as account reviews. Multifactor authentication - Answer- Combines authentication technologies from two or more categories. MAC address - Answer- Provides very weak authentication for devices to networks. Trusted Platform Module (TPM) - Answer- Provides stronger authentication techniques. Security Assertion Markup Language (SAML) - Answer- Allows browser-based single sign-on across a variety of systems. Type 1 factors - Answer- Rely upon secret information, such as a password. Type 2 factors - Answer- Rely upon physical possession of an object, such as a smartphone. Type 3 factors - Answer- Rely upon biometric characteristics of a person, such as a face scan or fingerprint. Subject (principal) - Answer- The end user. Identity provider - Answer- The organization providing the user's account that is used for authentication. Service provider - Answer- The organization offering the service requested by the end user. OAuth2 - Answer- An authorization standard that allows users to log into applications using credentials provided by other identity providers without providing the application with those credentials. OpenID Connect - Answer- A consumer-focused implementation of OAuth2 used by Google Cloud and other cloud service providers. False positive errors - Answer- Errors that occur when a system accepts an invalid user as correct, measured using the false acceptance rate (FAR). False negative errors - Answer- Errors that occur when a system rejects a valid user, measured using the false rejection rate (FRR). Crossover error rate (CER) - Answer- A metric used to evaluate the effectiveness of an authentication technology. Discretionary Access Control (DAC) - Answer- Access control decisions are delegated to the owners of objects who may further delegate authority. Extranet networks - Answer- Networks shared with trusted partners, such as vendors, contractors, and consultants, containing only resources that should be shared. Demilitarized Zone (DMZ) - Answer- Hosts servers that must be exposed to the public Internet. Mandatory Access Control (MAC) - Answer- Non-discretionary access control determined by labels assigned to subjects and objects. Role-based Access Control (RBAC) - Answer- Users are assigned to roles based upon their job duties, with permissions assigned to roles rather than directly to users. Attribute-based Access Control (ABAC) - Answer- Access control decisions based upon characteristics of the user's account. Trust relationships - Answer- Described by direction (one-way or two-way) and transitivity (whether trust can be inferred from other relationships).

Show more Read less
Institution
SSCP
Course
SSCP

Content preview

SSCP Exam Solved Correctly
HIPAA/HITECH - Answer- Health information

FERPA - Answer- Educational records

GLBA - Answer- Financial services sector

COPPA - Answer- Information related to children under the age of 13

Privacy Act of 1974 - Answer- Information held by federal agencies

GDPR - Answer- PII of European Union residents

PIPEDA - Answer- PII of Canadian residents

APEC CPEA - Answer- PII of residents of Asian-Pacific nations

Confidentiality - Answer- Prevents unauthorized disclosure

Integrity - Answer- Prevents unauthorized alteration

Availability - Answer- Ensures authorized access

Accountability - Answer- Provides the ability to trace every action taken on a system
back to an individual user without any ambiguity

Non-repudiation - Answer- Prevents the user from denying responsibility for an action

Deterrent Controls - Answer- Seek to dissuade an attacker from attempting to violate a
security policy

Preventative Controls - Answer- Seek to block an attempt to violate a security policy
from succeeding

Detective Controls - Answer- Seek to identify attack attempts that do occur

Need to know - Answer- Requires a legitimate business need to access information

Least privilege - Answer- Grants individuals the minimum necessary permissions to
perform their jobs

Separation of duties - Answer- Blocks someone from having two sensitive privileges in
combination

,Two-person control - Answer- Requires two people to perform a sensitive activity

Mandatory vacations - Answer- Seek to prevent fraudulent activity by uncovering
malfeasance

Corrective Controls - Answer- Seek to restore normal service after a disruption

Compensating Controls - Answer- Seek to address a gap created by the absence of
another required control

Technical Controls - Answer- Use technological means to achieve control objectives

Physical Controls - Answer- Use real-world physical means to achieve control
objectives

Administrative Controls - Answer- Use policy and procedure mechanisms to achieve
control objectives

Due care - Answer- Taking reasonable steps to protect the interest of the organization

Due diligence - Answer- Ensures that reasonable steps are carried out

Criminal laws - Answer- Laws that may involve prison or fines.

Civil laws - Answer- Laws that regulate non-criminal disputes.

Administrative laws - Answer- Laws set by government agencies.

Regulations - Answer- Rules from industry bodies.

Request control - Answer- Manages, evaluates, and prioritizes inbound requests from
customers.

Change control - Answer- Grants permission for developers to make changes to
application code.

Release control - Answer- Moves code from the development environment into
production.

Security professionals - Answer- Responsible for assessing and ensuring the
organization's compliance with internal policies and external laws, regulations, and
contractual obligations.

Asset management systems - Answer- Track hardware, software, and data assets
throughout their lifecycle.

, DevOps - Answer- A collaborative approach that combines software development (Dev)
and IT operations (Ops) to improve the efficiency, speed, and quality of software
delivery.

DevSecOps - Answer- Integrates security practices into the DevOps process, ensuring
that security is a shared responsibility throughout the entire software development
lifecycle.

Lifecycle stages - Answer- Include process, planning, design, initiation, development or
acquisition, inventory and licensing, implementation and assessment,
operation/maintenance/end of life, archiving and retention requirements, disposal and
destruction.

FRR - Answer- False Rejection Rate.

FAR - Answer- False Acceptance Rate.

Identification - Answer- Where a user makes a claim of identity.

Authentication - Answer- Where the user proves the claim of identity.

Authorization - Answer- Where the system confirms that the user is permitted to perform
the requested action.

CER - Answer- Crossover Error Rate.

Access control systems - Answer- Seek to limit the access that subjects have to objects.

Sensitivity - Answer- Refers to the level of protection required for information.

Single sign-on (SSO) - Answer- Allows the use of a single account across multiple
systems without requiring repeated logins.

Federation - Answer- Shares account information across systems belonging to different
service providers.

Technical controls - Answer- Use hardware and software mechanisms, such as firewalls
and intrusion prevention systems, to limit access.

Physical controls - Answer- Limit physical access to controlled spaces, such as locks
and keys.

Administrative controls - Answer- Provide management of personnel and business
practices, such as account reviews.

Written for

Institution
SSCP
Course
SSCP

Document information

Uploaded on
February 4, 2026
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.94
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Stuviaascorers University of Washington
View profile
Follow You need to be logged in order to follow users or courses
Sold
360
Member since
2 year
Number of followers
185
Documents
10457
Last sold
17 hours ago
StuviaAscorers | Top Study Notes & Exam Solutions

Stuviaascorers – Your #1 Source for Top-Quality Study Materials! Struggling with exams? Stuviaascorers has got you covered! I provide expertly crafted study notes, summaries, past papers, and exam-ready answers to help you pass with flying colors. My materials are designed for clarity, accuracy, and success—so you can study smarter, not harder! Why Choose My Study Materials? Well-structured & easy to understand – No fluff, just what you need! Exam-focused & high-scoring content – Get straight to the point! Accurate answers & clear explanations – Learn with confidence! Save time & boost your grades – Study efficiently! Don’t leave your success to chance! Browse my documents and start acing your exams today!

Read more Read less
3.8

64 reviews

5
30
4
11
3
11
2
2
1
10

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions