100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
(ISC)² SSCP Official Exam With Correct Questions And Answers 2024 $19.49   Add to cart

Exam (elaborations)

(ISC)² SSCP Official Exam With Correct Questions And Answers 2024

 1 view  0 purchase
  • Course
  • ² SSCP
  • Institution
  • ² SSCP

(ISC)² SSCP Official Exam With Correct Questions And Answers 2024

Preview 4 out of 189  pages

  • August 7, 2024
  • 189
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ² SSCP
  • ² SSCP
avatar-seller
RANKGRADES
(ISC)² SSCP Official Exam With Correct
Questions And Answers 2024

Access eControl eObject e- ecorrect eanswer.A epassive eentity ethat etypically ereceives eor
econtains esome eform eof edata.




Access eControl eSubject e- ecorrect eanswer.An eactive eentity eand ecan ebe eany euser,
eprogram, eor eprocess ethat erequests epermission eto ecause edata eto eflow efrom ean eaccess

econtrol eobject eto ethe eaccess econtrol esubject eor ebetween eaccess econtrol eobjects.




Asynchronous ePassword eToken e- ecorrect eanswer.A eone-time epassword eis egenerated
ewithout ethe euse eof ea eclock, eeither efrom ea eone-time epad eor ecryptographic ealgorithm.




Authorization e- ecorrect eanswer.Determines ewhether ea euser eis epermitted eto eaccess ea
eparticular eresource.




Connected eTokens e- ecorrect eanswer.Must ebe ephysically econnected eto ethe ecomputer eto
ewhich ethe euser eis eauthenticating.




Contactless eTokens e- ecorrect eanswer.Form ea elogical econnection eto ethe eclient ecomputer
ebut edo enot erequire ea ephysical econnection.




Disconnected eTokens e- ecorrect eanswer.Have eneither ea ephysical enor elogical econnection
eto ethe eclient ecomputer.




Entitlement e- ecorrect eanswer.A eset eof erules, edefined eby ethe eresource eowner, efor
emanaging eaccess eto ea eresource e(asset, eservice, eor eentity) eand efor ewhat epurpose.




Identity eManagement e- ecorrect eanswer.The etask eof econtrolling einformation eabout eusers
eon ecomputers.




Proof eof eIdentity e- ecorrect eanswer.Verify epeople's eidentities ebefore ethe eenterprise eissues
ethem eaccounts eand ecredentials.




Kerberos e- ecorrect eanswer.A epopular enetwork eauthentication eprotocol efor eindirect e(third-
party) eauthentication eservices.

Lightweight eDirectory eAccess eProtocol e(LDAP) e- ecorrect eanswer.A eclient/server-based
edirectory equery eprotocol eloosely ebased eon eX.500, ecommonly eused eto emanage euser

,einformation. eLDAP eis ea efront eend eand enot eused eto emanage eor esynchronize edata eper ese
eas eopposed eto eDNS.




Single eSign-On e(SSO) e- ecorrect eanswer.Designed eto eprovide estrong eauthentication
eusing esecret-key ecryptography, eallowing ea esingle eidentity eto ebe eshared eacross emultiple

eapplications.




Static ePassword eToken e- ecorrect eanswer.The edevice econtains ea epassword ethat eis
ephysically ehidden e(not evisible eto ethe epossessor) ebut ethat eis etransmitted efor eeach

eauthentication.




Synchronous eDynamic ePassword eToken e- ecorrect eanswer.A etimer eis eused eto erotate
ethrough evarious ecombinations eproduced eby ea ecryptographic ealgorithm.




Trust ePath e- ecorrect eanswer.A eseries eof etrust erelationships ethat eauthentication erequests
emust efollow ebetween edomains




6to4 e- ecorrect eanswer.Transition emechanism efor emigrating efrom eIPv4 eto eIPv6. eIt eallows
esystems eto euse eIPv6 eto ecommunicate eif etheir etraffic ehas eto etransverse ean eIPv4 enetwork.




Absolute eaddresses e- ecorrect eanswer.Hardware eaddresses eused eby ethe eCPU.

Abstraction e- ecorrect eanswer.The ecapability eto esuppress eunnecessary edetails eso ethe
eimportant, einherent eproperties ecan ebe eexamined eand ereviewed.




Accepted eways efor ehandling erisk e- ecorrect eanswer.Accept, etransfer, emitigate, eavoid.

Access e- ecorrect eanswer.The eflow eof einformation ebetween ea esubject eand ean eobject.

Access econtrol ematrix e- ecorrect eanswer.A etable eof esubjects eand eobjects eindicating ewhat
eactions eindividual esubjects ecan etake eupon eindividual eobjects.




Access econtrol emodel e- ecorrect eanswer.An eaccess econtrol emodel eis ea eframework ethat
edictates ehow esubjects eaccess eobjects.




Access econtrols e- ecorrect eanswer.Are esecurity efeatures ethat econtrol ehow eusers eand
esystems ecommunicate eand einteract ewith eother esystems eand eresources.




Accreditation e- ecorrect eanswer.Formal eacceptance eof ethe eadequacy eof ea esystem's
eoverall esecurity eby emanagement.




Active eattack e- ecorrect eanswer.Attack ewhere ethe eattacker edoes einteract ewith eprocessing
eor ecommunication eactivities.

,ActiveX e- ecorrect eanswer.A eMicrosoft etechnology ecomposed eof ea eset eof eOOP
etechnologies eand etools ebased eon eCOM eand eDCOM. eIt eis ea eframework efor edefining

ereusable esoftware ecomponents ein ea eprogramming elanguage-independent emanner




Address ebus e- ecorrect eanswer.Physical econnections ebetween eprocessing ecomponents
eand ememory esegments eused eto ecommunicate ethe ephysical ememory eaddresses ebeing

eused eduring eprocessing eprocedures.




Address eresolution eprotocol e(ARP) e- ecorrect eanswer.A enetworking eprotocol eused efor
eresolution eof enetwork elayer eIP eaddresses einto elink elayer eMAC eaddresses.




Address espace elayout erandomization e(ASLR) e- ecorrect eanswer.Memory eprotection
emechanism eused eby esome eoperating esystems. eThe eaddresses eused eby ecomponents eof

ea eprocess eare erandomized eso ethat eit eis eharder efor ean eattacker eto eexploit especific

ememory evulnerabilities.




Algebraic eattack e- ecorrect eanswer.Cryptanalysis eattack ethat eexploits evulnerabilities
ewithin ethe eintrinsic ealgebraic estructure eof emathematical efunctions.




Algorithm e- ecorrect eanswer.Set eof emathematical eand elogic erules eused ein ecryptographic
efunctions.




Analog esignals e- ecorrect eanswer.Continuously evarying eelectromagnetic ewave ethat
erepresents eand etransmits edata.




Analytic eattack e- ecorrect eanswer.Cryptanalysis eattack ethat eexploits evulnerabilities ewithin
ethe ealgorithm estructure.




Annualized eloss eexpectancy e(ALE) e- ecorrect eanswer.Annual eexpected eloss eif ea especific
evulnerability eis eexploited eand ehow eit eaffects ea esingle easset. eSLE e× eARO e= eALE.




Application eprogramming einterface e(API) e- ecorrect eanswer.Software einterface ethat
eenables eprocess-to-

process einteraction. eCommon eway eto eprovide eaccess eto estandard eroutines eto ea eset eof
esoftware eprograms.




Arithmetic elogic eunit e(ALU) e- ecorrect eanswer.A ecomponent eof ethe ecomputer's eprocessing
eunit, ein ewhich earithmetic eand ematching eoperations eare eperformed.




AS/NZS e4360 e- ecorrect eanswer.Australia eand eNew eZealand ebusiness erisk emanagement
eassessment eapproach.




Assemblers e- ecorrect eanswer.Tools ethat econvert eassembly ecode einto ethe enecessary
emachine-compatible ebinary elanguage efor eprocessing eactivities eto etake eplace.

, Assembly elanguage e- ecorrect eanswer.A elow-level eprogramming elanguage ethat eis ethe
emnemonic erepresentation eof emachine-level einstructions.




Assurance eevaluation ecriteria e- ecorrect eanswer.Check-list eand eprocess eof eexamining ethe
esecurity-relevant eparts eof ea esystem e(TCB, ereference emonitor, esecurity ekernel) eand

eassigning ethe esystem ean eassurance erating.




Asymmetric ealgorithm e- ecorrect eanswer.Encryption emethod ethat euses etwo edifferent ekey
etypes, epublic eand eprivate. eAlso ecalled epublic ekey ecryptography.




Asymmetric emode emultiprocessing e- ecorrect eanswer.When ea ecomputer ehas etwo eor
emore eCPUs eand eone eCPU eis ededicated eto ea especific eprogram ewhile ethe eother eCPUs

ecarry eout egeneral eprocessing eprocedures




Asynchronous ecommunication e- ecorrect eanswer.Transmission esequencing etechnology
ethat euses estart eand estop ebits eor esimilar eencoding emechanism. eUsed ein eenvironments

ethat etransmit ea evariable eamount eof edata ein ea eperiodic efashion.




Asynchronous etoken egenerating emethod e- ecorrect eanswer.Employs ea
echallenge/response escheme eto eauthenticate ethe euser.




Attack esurface e- ecorrect eanswer.Components eavailable eto ebe eused eby ean eattacker
eagainst ethe eproduct eitself.




Attenuation e- ecorrect eanswer.Gradual eloss ein eintensity eof eany ekind eof eflux ethrough ea
emedium. eAs ean eelectrical esignal etravels edown ea ecable, ethe esignal ecan edegrade eand

edistort eor ecorrupt ethe edata eit eis ecarrying.




Attribute e- ecorrect eanswer.A ecolumn ein ea etwo-dimensional edatabase.

Authentication eHeader e(AH) eProtocol e- ecorrect eanswer.Protocol ewithin ethe eIPSec esuite
eused efor eintegrity eand eauthentication.




Authenticode e- ecorrect eanswer.A etype eof ecode esigning, ewhich eis ethe eprocess eof edigitally
esigning esoftware ecomponents eand escripts eto econfirm ethe esoftware eauthor eand

eguarantee ethat ethe ecode ehas enot ebeen ealtered eor ecorrupted esince eit ewas edigitally

esigned. eAuthenticode eis eMicrosoft's eimplementation eof ecode esigning.




Availability e- ecorrect eanswer.Reliable eand etimely eaccess eto edata eand eresources eis
eprovided eto eauthorized eindividuals.




Avalanche eeffect e- ecorrect eanswer.Algorithm edesign erequirement eso ethat eslight echanges
eto ethe einput eresult ein edrastic echanges eto ethe eoutput.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller RANKGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $19.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76800 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$19.49
  • (0)
  Add to cart