(ISC)²
/ /
SSCP
/ /
EXAM
/ /
QUESTIONS WITH CORRECT ANSWERS
/ // // //
Access Control Object - VERIFIED ANSWER(S)✔😊
// // // // //
A /
passive entity that typically receives or contains some form of data.
/ // // // // // // // // // //
Access Control Subject - VERIFIED ANSWER(S)✔😊
// // // // //
An /
active
/ /
entity
/ /
and
/ /
can
/ /
be
/ /
any
/ /
user,
/ /
program,
/ /
or
/ /
process
/ /
that
/ /
requests
/ /
permission
/ /
,/ to/
/ cause /
/ data /
/ to/
/ flow /
/ from /
/ an /
/ access /
/ control /
/ object /
/ to the access control subject or between access control objects.
// // // // // // // // //
Asynchronous Password Token - VERIFIED ANSWER(S)✔😊A one- // // // // // //
time /
password
/ /
is generated without the use of a clock, either from a one-
/ // // // // // // // // // // //
time pad or cryptographic algorithm.
// // // //
Authorization - VERIFIED ANSWER(S)✔😊 // // //
Determines /
whether a user is permitted to access a particular resource.
/ // // // // // // // // //
Connected Tokens - VERIFIED ANSWER(S)✔😊 // // // //
Must /
be
/ /
,/ physically /
/ connected to the computer to which the user is authenticating.
// // // // // // // // //
Contactless Tokens - VERIFIED ANSWER(S)✔😊 // // // //
Form //
a /
logical
/ /
connection
/ /
to the client computer but do not require a physical connection.
/ // // // // // // // // // //
Disconnected Tokens - VERIFIED ANSWER(S)✔😊 // // // //
Have /
neither a physical nor logical connection to the client computer.
/ // // // // // // // // //
Entitlement - VERIFIED ANSWER(S)✔😊 // // //
A /
set
/ /
of
/ /
rules,
/ /
defined
/ /
by
/ /
the
/ /
resource
/ /
owner,
/ /
for
/ /
managing
/ /
, / access /
/ to a resource (asset, service, or entity) and for what purpose.
// // // // // // // // // //
Identity Management - VERIFIED ANSWER(S)✔😊// // // //
The task of controlling information about users on computers.
// // // // // // // //
Proof of Identity - VERIFIED ANSWER(S)✔😊
// // // // //
Verify /
people's
/ /
identities
/ /
before the enterprise issues them accounts and credentials.
/ // // // // // // //
Kerberos - VERIFIED ANSWER(S)✔😊 // // //
A popular network authentication protocol for indirect (third-
// // // // // // //
party) authentication services.
// //
Lightweight /
Directory Access Protocol (LDAP) - VERIFIED ANSWER(S)✔😊
/ // // // // // //
A client/server-
//
based /
directory
/ /
query
/ /
protocol
/ /
loosely
/ /
based
/ /
on
/ /