SSCP TESTS| 179 QUESTIONS| WITH COMPLETE SOLUTIONS
Referred to as the AAA of access control: authentication, authorization, and accounting correct answer: AAA, Triple A A list of subjects and assigned rights used in access control. correct answer: access control list (ACL) Referred to as the AAA of access control: authentication, authorization, and accounting. correct answer: AAA/ Triple A A list of subjects and assigned rights used in access control. correct answer: access control list (ACL) Formal acceptance by management that a system or application has been certified and may be placed into operation. correct answer: accreditation Controls put in place to enforce policies and directives as dictated by the organization. correct answer: administrative controls A symmetric block algorithm selected by NIST to be used as a standard by the U.S. government correct answer: Advanced Encryption Standard (AES) The three of confidentiality, integrity, and availability that form the basis for security objectives that are the essence of security for all information systems. correct answer: AIC security triad A message triggered by an event. Alerts may take the form of email, text messages, computer screen banners, flashing lights, and other methods of drawing attention to an issue. correct answer: alert A mathematical function cryptographic algorithm that encrypts or decrypts text. correct answer: algorithm A number representing the number of times during the period of a year that a threat will exploit a specific vulnerability. correct answer: annualized rate of occurrence (ARO) The cryptographic algorithm that requires two separate keys; one is secret and the other public. correct answer: asymmetric algorithm The process of using two keys, a public key and a private key, to encrypt and decrypt messages. correct answer: asymmetric encryption Method used to verify the identity claim of a user. correct answer: authentication The act of defining the network resources, applications, and data that may be accessed by a user. correct answer: authorization One of the central principles of the AIC triad. A core goal of a security professional is to ensure that data and hardware are available when the user requires them. correct answer: availability An accessible port or portal created by a program
Written for
- Institution
-
Liberty University
- Course
-
SSCP
Document information
- Uploaded on
- March 6, 2023
- Number of pages
- 22
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
sscp tests| 179 questions| with complete solutions
Also available in package deal