Guards are appropriate whenever the function required by the security program involves which of the following?
Answer(s): A
The use of discriminating judgment, a guard can make the determinations that hardware or other automated security devices cannot make due to its ability to adjust to rapidly changing conditions, to learn and alter recognizable patterns, and to respond to various conditions in the environment. Guards are better at making value decisions at times of incidents. They are appropriate whenever immediate, discriminating judgment is required by the security entity.The following answers are incorrect:The use of physical force This is not the best answer. A guard provides discriminating judgment, and the ability to discern the need for physical force. The operation of access control devices A guard is often uninvolved in the operations of an automated access control device such as a biometric reader, a smart lock, mantrap, etc. The need to detect unauthorized access The primary function of a guard is not to detect unauthorized access, but to prevent unauthorized physical access attempts and may deter social engineering attempts.The following reference(s) were/was used to create this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 10: Physical security (page 339). ISC2 Offical Guide to the CBK page 288-289.
What physical characteristic does a retinal scan biometric device measure?
Answer(s): D
The retina, a thin nerve (1/50th of an inch) on the back of the eye, is the part of the eye which senses light and transmits impulses through the optic nerve to the brain - the equivalent of film in a camerA. Blood vessels used for biometric identification are located along the neural retina, the outermost of retina's four cell layers.The following answers are incorrect:The amount of light reaching the retina The amount of light reaching the retina is not used in the biometric scan of the retina.The amount of light reflected by the retina The amount of light reflected by the retina is not used in the biometric scan of the retina.The pattern of light receptors at the back of the eye This is a distractorThe following reference(s) were/was used to create this question:
Retina Scan Technology.ISC2 Official Guide to the CBK, 2007 (Page 161)
Which is the last line of defense in a physical security sense?
"Ultimately, people are the last line of defense for your company's assets" (Pastore & Dulaney, 2006, p. 529).Pastore, M. and Dulaney, E. (2006). CompTIA Security+ study guide: Exam SY0-101.Indianapolis, IN: Sybex.
The Computer Security Policy Model the Orange Book is based on is which of the following?
The Computer Security Policy Model Orange Book is based is the Bell-LaPadula Model. Orange Book Glossary.The Data Encryption Standard (DES) is a cryptographic algorithm. National Information SecurityGlossary.TEMPEST is related to limiting the electromagnetic emanations from electronic equipment.
U.S. Department of Defense, Trusted Computer System Evaluation Criteria (Orange Book), DOD 5200.28-STD. December 1985 (also available here).
The end result of implementing the principle of least privilege means which of the following?
The principle of least privilege refers to allowing users to have only the access they need and not anything more. Thus, certain users may have no need to access any of the files on specific systems.The following answers are incorrect:Users can access all systems. Although the principle of least privilege limits what access and systems users have authorization to, not all users would have a need to know to access all of the systems. The best answer is still Users would get access to only the info for which they have a need to know as some of the users may not have a need to access a system.Users get new privileges when they change positions. Although true that a user may indeed require new privileges, this is not a given fact and in actuality a user may require less privileges for a new position. The principle of least privilege would require that the rights required for the position be closely evaluated and where possible rights revoked.Authorization creep. Authorization creep occurs when users are given additional rights with new positions and responsibilities. The principle of least privilege should actually prevent authorization creep.The following reference(s) were/was used to create this question:ISC2 OIG 2007 p.101,123Shon Harris AIO v3 p148, 902-903
Share your comments for ISC SSCP exam with other users:
please upload dump, i have exam in 2 days
this is useful
question 232 answer should be perimeter not netowrk layer. wrong answer selected
nice questions
hi team, could you please provide this dump ?
very helpful to clear the exam and understand the concept.
i think it is great that you are helping people when they need it. thanks.
cannot evaluate yet
a laptops wireless antenna is most likely located in the bezel of the lid
good examplae to learn basic
this is useful information
looks usefull
question 81 should be c.
question 18 : response isnt a ?
plaese add questions
is dumps still valid ?
thanks for this
please upload questions
please upload the question dump for professional machinelearning
question 4 answer is c. this site shows the correct answer as b. "adopt a consumption model" is clearly a cost optimization design principle. looks like im done using this site to study!!!
number 52 answer is d
just started preparing for my exam , and this site is so much help
question 35 is incorrect, the correct answer is c, it even states so: explanation: when a vm is infected with ransomware, you should not restore the vm to the infected vm. this is because the ransomware will still be present on the vm, and it will encrypt the files again. you should also not restore the vm to any vm within the companys subscription. this is because the ransomware could spread to other vms in the subscription. the best way to restore a vm that is infected with ransomware is to restore it to a new azure vm. this will ensure that the ransomware is not present on the new vm.
i would like to take psm1 exam.
cbd and pdb are key to the database
the purchase and download process is very much streamlined. the xengine application is very nice and user-friendly but there is always room for improvement.
please upload p_sapea_2023
anyone use this? the question dont seem to follow other formats and terminology i have been studying im getting worried
good questions
hello are these questions valid for ms-102
some questions are wrongly answered but its good nonetheless
how to get system serial number using intune
is it really helpful to pass the exam
#229 in incorrect - all the customers require an annual review