Official (ISC) ² SSCP Questions and Answers Already Passed
Official (ISC) ² SSCP Questions and Answers Already Passed Access Control Object A passive entity that typically receives or contains some form of data. Access Control Subject An active entity and can be any user, program, or process that requests permission to cause data to flow from an access control object to the access control subject or between access control objects. Asynchronous Password Token A one-time password is generated without the use of a clock, either from a one-time pad or cryptographic algorithm. Authorization Determines whether a user is permitted to access a particular resource. Connected Tokens Must be physically connected to the computer to which the user is authenticating. Contactless Tokens Form a logical connection to the client computer but do not require a physical connection. Disconnected Tokens Have neither a physical nor logical connection to the client computer. Entitlement A set of rules, defined by the resource owner, for managing access to a resource (asset, service, or entity) and for what purpose. Identity Management The task of controlling information about users on computers. Proof of Identity Verify people's identities before the enterprise issues them accounts and credentials. Kerberos A popular network authentication protocol for indirect (third-party) authentication services. Lightweight Directory Access Protocol (LDAP) A client/server-based directory query protocol loosely based on X.500, commonly used to manage user information. LDAP is a front end and not used to manage or synchronize data per se as opposed to DNS. Single Sign-On (SSO) Designed to provide strong authentication using secret-key cryptography, allowing a single identity to be shared across multiple applications. Static Password Token The device contains a password that is physically hidden (not visible to the possessor) but that is transmitted for each authentication. Synchronous Dynamic Password Token A timer is used to rotate through various combinations produced by a cryptographic algorithm. Trust Path A series of trust relationships that authentication requests must follow between domains 6to4 Transition mechanism for migrating from IPv4 to IPv6. It allows systems to use IPv6 to communicate if their traffic has to transverse an IPv4 network. Absolute addresses Hardware addresses used by the CPU. Abstraction The capability to suppress unnecessary details so the important, inherent properties can be examined and reviewed. Accepted ways for handling risk Accept, transfer, mitigate, avoid. Access The flow of information between a subject and an
Written for
- Institution
- Official ² SSCP
- Course
- Official ² SSCP
Document information
- Uploaded on
- September 22, 2023
- Number of pages
- 430
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
official isc sscp questions and answers alread
Also available in package deal