SYSTEMS SECURITY CERTIFIED
PRACTITIONER (SSCP) - EXAM PREP
Access Control Object - Correct Answers -A passive entity that typically receives or
contains some form of data.
Access Control Subject - Correct Answers -An active entity and can be any user,
program, or process that requests permission to cause data to flow from an access
control object to the access control subject or between access control objects.
Asynchronous Password Token - Correct Answers -A one-time password is generated
without the use of a clock, either from a one-time pad or cryptographic algorithm.
Authorization - Correct Answers -Determines whether a user is permitted to access a
particular resource.
Connected Tokens - Correct Answers -Must be physically connected to the computer to
which the user is authenticating.
Contactless Tokens - Correct Answers -Form a logical connection to the client computer
but do not require a physical connection.
Disconnected Tokens - Correct Answers -Have neither a physical nor logical connection
to the client computer.
Entitlement - Correct Answers -A set of rules, defined by the resource owner, for
managing access to a resource (asset, service, or entity) and for what purpose.
Identity Management - Correct Answers -The task of controlling information about users
on computers.
Proof of Identity - Correct Answers -Verify people's identities before the enterprise
issues them accounts and credentials.
Kerberos - Correct Answers -A popular network authentication protocol for indirect
(third-party) authentication services.
Lightweight Directory Access Protocol (LDAP) - Correct Answers -A client/server-based
directory query protocol loosely based on X.500, commonly used to manage user
, information. LDAP is a front end and not used to manage or synchronize data per se as
opposed to DNS.
Single Sign-On (SSO) - Correct Answers -Designed to provide strong authentication
using secret-key cryptography, allowing a single identity to be shared across multiple
applications.
Static Password Token - Correct Answers -The device contains a password that is
physically hidden (not visible to the possessor) but that is transmitted for each
authentication.
Synchronous Dynamic Password Token - Correct Answers -A timer is used to rotate
through various combinations produced by a cryptographic algorithm.
Trust Path - Correct Answers -A series of trust relationships that authentication requests
must follow between domains
Availability - Correct Answers -Refers to the ability to access and use information
systems when and as needed to support an organization's operations.
Breach - Correct Answers -The intentional or unintentional release of secure information
to an untrusted environment.
CMDB - Correct Answers -A configuration management database (CMDB) is a
repository that contains a collection of IT assets that are referred to as configuration
items.
Compensating Controls - Correct Answers -Introduced when the existing capabilities of
a system do not support the requirements of a policy.
Confidentiality - Correct Answers -Refers to the property of information in which it is only
made available to those who have a legitimate need to know.
Configuration Management (CM) - Correct Answers -A discipline that seeks to manage
configuration changes so that they are appropriately approved and documented, so that
the integrity of the security state is maintained, and so that disruptions to performance
and availability are minimized.
Corrective Control - Correct Answers -These controls remedy the circumstances that
enabled unwarranted activity, and/ or return conditions to where they were prior to the
unwanted activity.
COTS - Correct Answers -A Federal Acquistion Regulation (FAR) term for commercial
off-the-shelf (COTS) items, that can be purchased n the commercial marketplace and
used under government contract.
PRACTITIONER (SSCP) - EXAM PREP
Access Control Object - Correct Answers -A passive entity that typically receives or
contains some form of data.
Access Control Subject - Correct Answers -An active entity and can be any user,
program, or process that requests permission to cause data to flow from an access
control object to the access control subject or between access control objects.
Asynchronous Password Token - Correct Answers -A one-time password is generated
without the use of a clock, either from a one-time pad or cryptographic algorithm.
Authorization - Correct Answers -Determines whether a user is permitted to access a
particular resource.
Connected Tokens - Correct Answers -Must be physically connected to the computer to
which the user is authenticating.
Contactless Tokens - Correct Answers -Form a logical connection to the client computer
but do not require a physical connection.
Disconnected Tokens - Correct Answers -Have neither a physical nor logical connection
to the client computer.
Entitlement - Correct Answers -A set of rules, defined by the resource owner, for
managing access to a resource (asset, service, or entity) and for what purpose.
Identity Management - Correct Answers -The task of controlling information about users
on computers.
Proof of Identity - Correct Answers -Verify people's identities before the enterprise
issues them accounts and credentials.
Kerberos - Correct Answers -A popular network authentication protocol for indirect
(third-party) authentication services.
Lightweight Directory Access Protocol (LDAP) - Correct Answers -A client/server-based
directory query protocol loosely based on X.500, commonly used to manage user
, information. LDAP is a front end and not used to manage or synchronize data per se as
opposed to DNS.
Single Sign-On (SSO) - Correct Answers -Designed to provide strong authentication
using secret-key cryptography, allowing a single identity to be shared across multiple
applications.
Static Password Token - Correct Answers -The device contains a password that is
physically hidden (not visible to the possessor) but that is transmitted for each
authentication.
Synchronous Dynamic Password Token - Correct Answers -A timer is used to rotate
through various combinations produced by a cryptographic algorithm.
Trust Path - Correct Answers -A series of trust relationships that authentication requests
must follow between domains
Availability - Correct Answers -Refers to the ability to access and use information
systems when and as needed to support an organization's operations.
Breach - Correct Answers -The intentional or unintentional release of secure information
to an untrusted environment.
CMDB - Correct Answers -A configuration management database (CMDB) is a
repository that contains a collection of IT assets that are referred to as configuration
items.
Compensating Controls - Correct Answers -Introduced when the existing capabilities of
a system do not support the requirements of a policy.
Confidentiality - Correct Answers -Refers to the property of information in which it is only
made available to those who have a legitimate need to know.
Configuration Management (CM) - Correct Answers -A discipline that seeks to manage
configuration changes so that they are appropriately approved and documented, so that
the integrity of the security state is maintained, and so that disruptions to performance
and availability are minimized.
Corrective Control - Correct Answers -These controls remedy the circumstances that
enabled unwarranted activity, and/ or return conditions to where they were prior to the
unwanted activity.
COTS - Correct Answers -A Federal Acquistion Regulation (FAR) term for commercial
off-the-shelf (COTS) items, that can be purchased n the commercial marketplace and
used under government contract.