[Free] New Updated (October) ISC SSCP Real Exam 201-210




What are called user interfaces that limit the functions that can be selected by a user?



Constrained user interfaces


Limited user interfaces


Mini user interfaces


Unlimited user interfaces


Correct Answer: A


Constrained user interfaces limit the functions that can be selected by a user.


Another method for controlling access is by restricting users to specific functions based on their role in the system. This is typically implemented by limiting available menus, data views, encryption, or by physically constraining the user interfaces.


This is common on devices such as an automated teller machine (ATM). The advantage of a constrained user interface is that it limits potential avenues of attack and system failure by restricting the processing options that are available to the user.


On an ATM machine, if a user does not have a checking account with the bank he or she will not be shown the “Withdraw money from checking” option. Likewise, an information system might have an “Add/Remove Users” menu option for administrators, but if a normal, non-administrative user logs in he or she will not even see that menu option. By not even identifying potential options for non-qualifying users, the system limits the potentially harmful execution of unauthorized system or application commands.


Many database management systems have the concept of “views.” A database view is an extract of the data stored in the database that is filtered based on predefined user or system criteria. This permits multiple users to access the same database while only having the ability to access data they need (or are allowed to have) and not data for another user. The use of database views is another example of a constrained user interface.


The following were incorrect answers:

All of the other choices presented were bogus answers.


The following reference(s) were used for this question:

Hernandez CISSP, Steven (2012-12-21). Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press) (Kindle Locations 1989-2002). Auerbach Publications. Kindle Edition.



What is called the use of technologies such as fingerprint, retina, and iris scans to authenticate the individuals requesting access to resources?


A.< /span>









Correct Answer: C


Source: KRUTZ, Ronald L.& VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 35.




RADIUS incorporates which of the following services?



Authentication server and PIN codes.


Authentication of clients and static passwords generation.


Authentication of clients and dynamic passwords generation.


Authentication server as well as support for Static and Dynamic passwords.


Correct Answer: D


A Network Access Server (NAS) operates as a client of RADIUS. The client is responsible for passing user information to

designated RADIUS servers, and then acting on the response which is returned.


RADIUS servers are responsible for receiving user connection requests, authenticating the user, and then returning all

configuration information necessary for the client to deliver service to the user.


RADIUS authentication is based on provisions of simple username/password credentials.

These credentials are encrypted

by the client using a shared secret between the client and the RADIUS server. OIG 2007, Page 513


RADIUS incorporates an authentication server and can make uses of both dynamic and static passwords.


Since it uses the PAP and CHAP protocols, it also incluses static passwords.


RADIUS is an Internet protocol. RADIUS carries authentication, authorization, and configuration information between a Network Access Server and a shared Authentication Server. RADIUS features and functions are described primarily in the IETF (International Engineering Task Force) document RFC2138.


The term ” RADIUS” is an acronym which stands for Remote Authentication Dial In User Service.


The main advantage to using a RADIUS approach to authentication is that it can provide a stronger form of authentication. RADIUS is capable of using a strong, two-factor form of authentication, in which users need to possess both a user ID and a hardware or software token to gain access.


Token-based schemes use dynamic passwords. Every minute or so, the token generates a unique 4-, 6- or 8-digit access number that is synchronized with the security server. To gain entry into the system, the user must generate both this one-time number and provide his or her user ID and password.


Although protocols such as RADIUS cannot protect against theft of an authenticated session via some realtime attacks, such as wiretapping, using unique, unpredictable authentication requests can protect against a wide range of active attacks.

RADIUS: Key Features and Benefits

Features Benefits


RADIUS supports dynamic passwords and challenge/response passwords.


Improved system security due to the fact that passwords are not static.


It is much more difficult for a bogus host to spoof users into giving up their passwords or password-generation algorithms.


RADIUS allows the user to have a single user ID and password for all computers in a network.


Improved usability due to the fact that the user has to remember only one login combination.


RADIUS is able to:


Prevent RADIUS users from logging in via login (or ftp).

Require them to log in via login (or ftp)

Require them to login to a specific network access server (NAS);

Control access by time of day.


Provides very granular control over the types of logins allowed, on a per-user basis.


The time-out interval for failing over from an unresponsive primary RADIUS server to a backup RADIUS server is site-configurable.


RADIUS gives System Administrator more flexibility in managing which users can login from which hosts or devices.


Stratus Technology Product Brief



Source: KRUTZ, Ronald L.& VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Pages 43, 44.


Also check: MILLER, Lawrence & GREGORY, Peter, CISSP for Dummies, 2002, Wiley Publishing, Inc., pages 45-46.




Which of the following is not a security goal for remote access?



Reliable authentication of users and systems


Protection of confidential data


Easy to manage access control to systems and network resources


Automated login for remote users


Correct Answer: D


An automated login function for remote users would imply a weak authentication, thus certainly not a security goal.

Source: TIPTON, Harold F.& KRAUSE, Micki, Information Security Management Handbook, 4th edition, volume 2, 2001, CRC Press, Chapter 5: An Introduction to Secure Remote Access (page 100).




What does the simple security (ss) property mean in the Bell-LaPadula model?



No read up


No write down


No read down


No write up


Correct Answer: A


The ss (simple security) property of the Bell-LaPadula access control model states that reading of information by a subject at a lower sensitivity level from an object at a higher sensitivity level is not permitted (no read up).

Source: KRUTZ, Ronald L.& VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 5: Security Architectures and Models (page 202).




A potential problem related to the physical installation of the Iris Scanner in regards to the usage of the iris pattern within a biometric system is:



concern that the laser beam may cause eye damage


the iris pattern changes as a person grows older.


there is a relatively high rate of false accepts.


the optical unit must be positioned so that the sun does not shine into the aperture.


Correct Answer: D


Because the optical unit utilizes a camera and infrared light to create the images, sun light can impact the aperture so it must not be positioned in direct light of any type. Because the subject does not need to have direct contact with the optical reader, direct light can impact the reader.

An Iris recognition is a form of biometrics that is based on the uniqueness of a subject’s iris.


A camera like device records the patterns of the iris creating what is known as Iriscode. It is the unique patterns of the iris that allow it to be one of the most accurate forms of biometric identification of an individual. Unlike other types of biometics, the iris rarely changes over time. Fingerprints can change over time due to scaring and manual labor, voice patterns can change due to a variety of causes, hand geometry can also change as well. But barring surgery or an accident it is not usual for an iris to change. The subject has a high-resoulution image taken of their iris and this is then converted to Iriscode. The current standard for the Iriscode was developed by John Daugman. When the subject attempts to be authenticated an infrared light is used to capture the iris image and this image is then compared to the Iriscode. If there is a match the subject’s identity is confirmed. The subject does not need to have direct contact with the optical reader so it is a less invasive means of authentication then retinal scanning would be.


Reference(s) used for this question:

AIO, 3rd edition, Access Control, p 134.

AIO, 4th edition, Access Control, p 182.

Wikipedia – http://en.wikipedia.org/wiki/Iris_recognition


The following answers are incorrect:


concern that the laser beam may cause eye damage. The optical readers do not use laser so, concern that the laser beam may cause eye damage is not an issue. the iris pattern changes as a person grows older. The question asked about the physical installation of the scanner, so this was not the best answer. If the question would have been about long term problems then it could have been the best choice. Recent research has shown that Irises actually do change over time: http://www.nature.com/news/ageing- eyes-hinder-biometric-scans-1.10722


there is a relatively high rate of false accepts. Since the advent of the Iriscode there is a very low rate of false accepts, in fact the algorithm used has never had a false match. This all depends on the quality of the equipment used but because of the uniqueness of the iris even when comparing identical twins, iris patterns are unique.




Which of the following is the WEAKEST authentication mechanism?







One-time passwords


Token devices


Correct Answer: B


Most of the time users usually choose passwords which can be guessed , hence passwords is the BEST answer out of the choices listed above.


The following answers are incorrect because:


Passphrases is incorrect as it is more secure than a password because it is longer.

One-time passwords is incorrect as the name states , it is good for only once and cannot be reused.

Token devices is incorrect as this is also a password generator and is an one time password mechanism.



Shon Harris AIO v3 , Chapter-4: Access Control , Page: 139 , 142.




Which of the following are not Remote Access concerns?



Justification for remote access


Auditing of activities


Regular review of access privileges


Access badges


Correct Answer: D


Access badges are more relevant to physical security rather than remote access.


“Justification for remote access” is incorrect. Justification for remote access is a relevant concern.


“Auditing of activities” is incorrect. Auditing of activites is an imporant aspect to assure that malicious or unauthorized activities are not occuring.


“Regular review of access privileges” is incorrect. Regular review of remote accept privileges is an important management responsibility.



AIO3, pp. 547 – 548




Which of the following does not apply to system-generated passwords?



Passwords are harder to remember for users.


If the password-generating algorithm gets to be known, the entire system is in jeopardy.


Passwords are more vulnerable to brute force and dictionary attacks.


Passwords are harder to guess for attackers.


Correct Answer: C


Users tend to choose easier to remember passwords. System-generated passwords can provide stronger, harder to guess passwords. Since they are based on rules provided by the administrator, they can include combinations of uppercase/lowercase letters, numbers and special characters, making them less vulnerable to brute force and dictionary attacks. One danger is that they are also harder to remember for users, who will tend to write them down, making them more vulnerable to anyone having access to the user’s desk. Another danger with system-generated passwords is that if the password- generating algorithm gets to be known, the entire system is in jeopardy.

Source: RUSSEL, Deborah & GANGEMI, G.T. Sr., Computer Security Basics, O’Reilly, July 1992 (page 64).




Organizations should consider which of the following first before allowing external access to their LANs via the Internet?



plan for implementing workstation locking mechanisms.


plan for protecting the modem pool.


plan for providing the user with his account usage information.


plan for considering proper authentication options.


Correct Answer: D


Before a LAN is connected to the Internet, you need to determine what the access controls mechanisms are to be used, this would include how you are going to authenticate individuals that may access your network externally through access control.


The following answers are incorrect:


plan for implementing workstation locking mechanisms. This is incorrect because locking the workstations have no impact on the LAN or Internet access.

plan for protecting the modem pool. This is incorrect because protecting the modem pool has no impact on the LAN or Internet access, it just protects the modem.

plan for providing the user with his account usage information. This is incorrect because the question asks what should be done first. While important your primary concern should be focused on security.

Free VCE & PDF File for ISC SSCP Real Exam

Instant Access to Free VCE Files: ISC | ISC | SAP …
Instant Access to Free PDF Files: ISC | ISC | SAP …

This entry was posted in Uncategorized and tagged , , , , , , . Bookmark the permalink.