Free SSCP Exam Braindumps

Pass your System Security Certified Practitioner (SSCP) exam with these free Questions and Answers

Page 8 of 215
QUESTION 31

- (Topic 1)
In non-discretionary access control using Role Based Access Control (RBAC), a central authority determines what subjects can have access to certain objects based on the organizational security policy. The access controls may be based on:

  1. A. The societies role in the organization
  2. B. The individual's role in the organization
  3. C. The group-dynamics as they relate to the individual's role in the organization
  4. D. The group-dynamics as they relate to the master-slave role in the organization

Correct Answer: B
In Non-Discretionary Access Control, when Role Based Access Control is being used, a central authority determines what subjects can have access to certain objects based on the organizational security policy. The access controls may be based on the individual's role in the organization.
Reference(S) used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 33.

QUESTION 32

- (Topic 4)
If your property Insurance has Replacement Cost Valuation (RCV) clause your damaged property will be compensated:

  1. A. Based on the value of item on the date of loss
  2. B. Based on new, comparable, or identical item for old regardless of condition of lost item
  3. C. Based on value of item one month before the loss
  4. D. Based on the value listed on the Ebay auction web site

Correct Answer: B
RCV is the maximum amount your insurance company will pay you for damage to covered property before deducting for depreciation. The RCV payment is based on the current cost to replace your property with new, identical or comparable property.
The other choices were detractor:
Application and definition of the insurance terms Replacement Cost Value (RCV), Actual Cash Value (ACV) and depreciation can be confusing. It’s important that you understand the terms to help settle your claim fairly.
An easy way to understand RCV and ACV is to think in terms of “new” and “used.” Replacement cost is the item's current price, new. “What will it cost when I replace it?” Actual cash is the item's used price, old. “How much money is it worth since I used it for five years?”
Hold Back
Most policies only pay the Actual Cash Value upfront, and then they pay you the “held back” depreciation after you incur the expense to repair or replace your personal property items.
NOTE: You must remember to send documentation to the insurance company proving you’ve incurred the additional expense you will be reimbursed.
Actual Cash Value (ACV)
ACV is the amount your insurance company will pay you for damage to covered property after deducting for depreciation. ACV is the replacement cost of a new item, minus depreciation. If stated as a simple equation, ACV could be defined as follows: ACV=RCV- Depreciation
Unfortunately, ACV is not always as easy to agree upon as a simple math equation. The ACV can also be calculated as the price a willing buyer would pay for your used item.
Depreciation
Depreciation (sometimes called “hold back”) is defined as the “loss in value from all causes, including age, and wear and tear.” Although the definition seems to be clear, in our experience, value” as a real-world application is clearly subjective and varies widely. We have seen the same adjuster apply NO depreciation (100 percent value) on one claim and 40 percent depreciation almost half value) on an almost identical claim.
This shows that the process of applying depreciation is subjective and clearly negotiable. Excessive Depreciation
When the insurance company depreciates more than they should, it is called “Excessive
depreciation.” Although not ethical, it is very common. Note any items that have excessive depreciation and write a letter to your insurance company.
References:
http://carehelp.org/downloads/category/1-insurance- handouts.html?download=17:handout08-rcv-and-acv and http://www.schirickinsurance.com/resources/value2005.pdf and
TIPTON, Harold F. & KRAUSE, MICKI, information Security Management Handbook, 4th Edition, Volume 1
Property Insurance overview, Page 587.

QUESTION 33

- (Topic 5)
In a known plaintext attack, the cryptanalyst has knowledge of which of the following?

  1. A. the ciphertext and the key
  2. B. the plaintext and the secret key
  3. C. both the plaintext and the associated ciphertext of several messages
  4. D. the plaintext and the algorithm

Correct Answer: C
In a known plaintext attack, the attacker has the plaintext and ciphertext of one or more messages. The goal is to discover the key used to encrypt the messages so that other messages can be deciphered and read.
Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw- Hill/Osborne, 3rd Ed., chapter 8: Cryptography (page 676). Also check out: Handbook of Applied Cryptography 4th Edition by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone.

QUESTION 34

- (Topic 5)
What kind of encryption is realized in the S/MIME-standard?

  1. A. Asymmetric encryption scheme
  2. B. Password based encryption scheme
  3. C. Public key based, hybrid encryption scheme
  4. D. Elliptic curve based encryption

Correct Answer: C
S/MIME (for Secure MIME, or Secure Multipurpose Mail Extension) is a security process used for e-mail exchanges that makes it possible to guarantee the confidentiality and non-repudiation of electronic messages.
S/MIME is based on the MIME standard, the goal of which is to let users attach files other than ASCII text files to electronic messages. The MIME standard therefore makes it possible to attach all types of files to e-mails.
S/MIME was originally developed by the company RSA Data Security. Ratified in July 1999 by the IETF, S/MIME has become a standard, whose specifications are contained in RFCs 2630 to 2633.
How S/MIME works
The S/MIME standard is based on the principle of public-key encryption. S/MIME therefore makes it possible to encrypt the content of messages but does not encrypt the communication.
The various sections of an electronic message, encoded according to the MIME standard, are each encrypted using a session key.
The session key is inserted in each section's header, and is encrypted using the recipient's public key. Only the recipient can open the message's body, using his private key, which guarantees the confidentiality and integrity of the received message.
In addition, the message's signature is encrypted with the sender's private key. Anyone intercepting the communication can read the content of the message's signature, but this ensures the recipient of the sender's identity, since only the sender is capable of encrypting a message (with his private key) that can be decrypted with his public key.
Reference(s) used for this question: http://en.kioskea.net/contents/139-cryptography-s-mime
RFC 2630: Cryptographic Message Syntax;
OPPLIGER, Rolf, Secure Messaging with PGP and S/MIME, 2000, Artech House; HARRIS, Shon, All-In-One CISSP Certification Exam Guide, 2001, McGraw-Hill/Osborne, page 570;
SMITH, Richard E., Internet Cryptography, 1997, Addison-Wesley Pub Co.

QUESTION 35

- (Topic 4)
A momentary power outage is a:

  1. A. spike
  2. B. blackout
  3. C. surge
  4. D. fault

Correct Answer: D
A momentary power outage is a fault.
Power Excess
Spike --> Too much voltage for a short period of time. Surge --> Too much voltage for a long period of time.
Power Loss
Fault --> A momentary power outage. Blackout --> A long power interruption.
Power Degradation
Sag or Dip --> A momentary low voltage.
Brownout --> A prolonged power supply that is below normal voltage. Reference(s) used for this question:
HARRIS, Shon, All-In-One CISSP Certification Exam Guide, 3rd. Edition McGraw- Hill/Osborne, 2005, page 368.
and https://en.wikipedia.org/wiki/Power_quality

Page 8 of 215

Post your Comments and Discuss ISC2 SSCP exam with other Community members: