OFFICIAL (ISC)² SSCP - DOMAIN 1: ACCESS
CONTROLS EXAM
Access Control Subject - Correct Answers -An active entity and can be any user,
program, or process that requests permission to cause data to flow from an access
control object to the access control subject or between access control objects.
Asynchronous Password Token - Correct Answers -A one-time password is generated
without the use of a clock, either from a one-time pad or cryptographic algorithm.
Authorization - Correct Answers -Determines whether a user is permitted to access a
particular resource.
Disconnected Tokens - Correct Answers -Have neither a physical nor logical connection
to the client computer.
Entitlement - Correct Answers -A set of rules, defined by the resource owner, for
managing access to a resource (asset, service, or entity) and for what purpose.
Identity Management - Correct Answers -The task of controlling information about users
on computers.
Connected Tokens - Correct Answers -Must be physically connected to the computer to
which the user is authenticating.
Contactless Tokens - Correct Answers -Form a logical connection to the client computer
but do not require a physical connection.
Proof of Identity - Correct Answers -Verify people's identities before the enterprise
issues them accounts and credentials.
Kerberos - Correct Answers -A popular network authentication protocol for indirect
(third-party) authentication services.
Lightweight Directory Access Protocol (LDAP) - Correct Answers -A client/server-based
directory query protocol loosely based on X.500, commonly used to manage user
information. LDAP is a front end and not used to manage or synchronize data per se as
opposed to DNS.
CONTROLS EXAM
Access Control Subject - Correct Answers -An active entity and can be any user,
program, or process that requests permission to cause data to flow from an access
control object to the access control subject or between access control objects.
Asynchronous Password Token - Correct Answers -A one-time password is generated
without the use of a clock, either from a one-time pad or cryptographic algorithm.
Authorization - Correct Answers -Determines whether a user is permitted to access a
particular resource.
Disconnected Tokens - Correct Answers -Have neither a physical nor logical connection
to the client computer.
Entitlement - Correct Answers -A set of rules, defined by the resource owner, for
managing access to a resource (asset, service, or entity) and for what purpose.
Identity Management - Correct Answers -The task of controlling information about users
on computers.
Connected Tokens - Correct Answers -Must be physically connected to the computer to
which the user is authenticating.
Contactless Tokens - Correct Answers -Form a logical connection to the client computer
but do not require a physical connection.
Proof of Identity - Correct Answers -Verify people's identities before the enterprise
issues them accounts and credentials.
Kerberos - Correct Answers -A popular network authentication protocol for indirect
(third-party) authentication services.
Lightweight Directory Access Protocol (LDAP) - Correct Answers -A client/server-based
directory query protocol loosely based on X.500, commonly used to manage user
information. LDAP is a front end and not used to manage or synchronize data per se as
opposed to DNS.