ISC SSCP System Security Certified Practitioner (SSCP) SSCP Exam Questions in PDF

Free ISC SSCP Dumps Questions (page: 9)

In which of the following security models is the subject's clearance compared to the object's classification such that specific rules can be applied to control how the subject-to-object interactions take place?

  1. Bell-LaPadula model
  2. Biba model
  3. Access Matrix model
  4. Take-Grant model

Answer(s): A

Explanation:

The Bell-LAPadula model is also called a multilevel security system because users with different clearances use the system and the system processes data with different classifications. Developed by the US Military in the 1970s.
A security model maps the abstract goals of the policy to information system terms by specifying explicit data structures and techniques necessary to enforce the security policy. A security model is usually represented in mathematics and analytical ideas, which are mapped to system specifications and then developed by programmers through programming code. So we have a policy that encompasses security goals, such as "each subject must be authenticated and authorized before accessing an object." The security model takes this requirement and provides the necessary mathematical formulas, relationships, and logic structure to be followed to accomplish this goal.
A system that employs the Bell-LaPadula model is called a multilevel security system because users with different clearances use the system, and the system processes data at different classification levels. The level at which information is classified determines the handling procedures that should be used. The Bell-LaPadula model is a state machine model that enforces the confidentiality aspects of access control. A matrix and security levels are used to determine if subjects can access different objects. The subject's clearance is compared to the object's classification and then specific rules are applied to control how subject-to-object subject-to-object interactions can take place.


Reference:

Harris, Shon (2012-10-25). CISSP All-in-One Exam Guide, 6th Edition (p. 369). McGraw-Hill.
Kindle Edition.



Which of the following classes is the first level (lower) defined in the TCSEC (Orange Book) as mandatory protection?

  1. B
  2. A
  3. C
  4. D

Answer(s): A

Explanation:

B level is the first Mandatory Access Control Level.
First published in 1983 and updated in 1985, the TCSEC, frequently referred to as the Orange Book, was a United States Government Department of Defense (DoD) standard that sets basic standards for the implementation of security protections in computing systems. Primarily intended to help the DoD find products that met those basic standards, TCSEC was used to evaluate,
classify, and select computer systems being considered for the processing, storage, and retrieval of sensitive or classified information on military and government systems. As such, it was strongly focused on enforcing confidentiality with no focus on other aspects of security such as integrity or availability. Although it has since been superseded by the common criteria, it influenced the development of other product evaluation criteria, and some of its basic approach and terminology continues to be used.


Reference:

Hernandez CISSP, Steven (2012-12-21). Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press) (Kindle Locations 17920-17926). Auerbach Publications. Kindle Edition.
and
THE source for all TCSEC "level" questions:
http://csrc.nist.gov/publications/secpubs/rainbow/std001.txt (paragraph 3 for this one)



Which of the following classes is defined in the TCSEC (Orange Book) as discretionary protection?

  1. C
  2. B
  3. A
  4. D

Answer(s): A

Explanation:


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, page 197.
Also: THE source for all TCSEC "level" questions:
http://csrc.nist.gov/publications/secpubs/rainbow/std001.txt



Which of the following division is defined in the TCSEC (Orange Book) as minimal protection?

  1. Division D
  2. Division C
  3. Division B
  4. Division A

Answer(s): A

Explanation:

The criteria are divided into four divisions: D, C, B, and A ordered in a hierarchical manner with the highest division (A) being reserved for systems providing the most comprehensive security.
Each division represents a major improvement in the overall confidence one can place in the system for the protection of sensitive information.
Within divisions C and B there are a number of subdivisions known as classes. The classes are also ordered in a hierarchical manner with systems representative of division C and lower classes of division B being characterized by the set of computer security mechanisms that they possess.
Assurance of correct and complete design and implementation for these systems is gained mostly through testing of the security- relevant portions of the system. The security-relevant portions of a system are referred to throughout this document as the Trusted Computing Base (TCB).
Systems representative of higher classes in division B and division A derive their security attributes more from their design and implementation structure. Increased assurance that the required features are operative, correct, and tamperproof under all circumstances is gained through progressively more rigorous analysis during the design process.
TCSEC provides a classification system that is divided into hierarchical divisions of assurance levels:
Division D - minimal security
Division C - discretionary protection
Division B - mandatory protection
Division A - verified protection


Reference:

page 358 AIO V.5 Shon Harris
also


KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, page 197.
Also:
THE source for all TCSEC "level" questions:
http://csrc.nist.gov/publications/secpubs/rainbow/std001.txt



Which of the following was developed by the National Computer Security Center (NCSC) for the US Department of Defense ?

  1. TCSEC
  2. ITSEC
  3. DIACAP
  4. NIACAP

Answer(s): A

Explanation:

TCSEC; The TCSEC, frequently referred to as the Orange Book, is the centerpiece of the DoD Rainbow Series publications.
Initially issued by the National Computer Security Center (NCSC) an arm of the National Security Agency in 1983 and then updated in 1985, TCSEC was replaced with the development of the Common Criteria international standard originally published in 2005.


Reference:

KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, pages 197-199.
Wikepedia
http://en.wikipedia.org/wiki/TCSEC



Share your comments for ISC SSCP exam with other users:

R
Romero
3/23/2022 4:20:00 PM

i never use these dumps sites but i had to do it for this exam as it is impossible to pass without using these question dumps.

J
John Kennedy
9/20/2023 3:33:00 AM

good practice and well sites.

N
Nenad
7/12/2022 11:05:00 PM

passed my first exam last week and pass the second exam this morning. thank you sir for all the help and these brian dumps.

L
Lucky
10/31/2023 2:01:00 PM

does anyone who attended exam csa 8.8, can confirm these questions are really coming ? or these are just for practicing?

P
Prateek
9/18/2023 11:13:00 AM

kindly share the dumps

I
Irfan
11/25/2023 1:26:00 AM

very nice content

P
php
6/16/2023 12:49:00 AM

passed today

D
Durga
6/23/2023 1:22:00 AM

hi can you please upload questions

J
JJ
5/28/2023 4:32:00 AM

please upload quetions

N
Norris
1/3/2023 8:06:00 PM

i passed my exam thanks to this braindumps questions. these questions are valid in us and i highly recommend it!

A
abuti
7/21/2023 6:10:00 PM

are they truely latest

C
Curtis Nakawaki
7/5/2023 8:46:00 PM

questions appear contemporary.

V
Vv
12/2/2023 6:31:00 AM

good to prepare in this site

P
praveenkumar
11/20/2023 11:57:00 AM

very helpful to crack first attempt

A
asad Raza
5/15/2023 5:38:00 AM

please upload this exam

R
Reeta
7/17/2023 5:22:00 PM

please upload the c_activate22 dump questions with answer

W
Wong
12/20/2023 11:34:00 AM

q10 - the answer should be a. if its c, the criteria will meet if either the prospect is not part of the suppression lists or if the job title contains vice president

D
david
12/12/2023 12:38:00 PM

this was on the exam as of 1211/2023

T
Tink
7/24/2023 9:23:00 AM

great for prep

J
Jaro
12/18/2023 3:12:00 PM

i think in question 7 the first answer should be power bi portal (not power bi)

9
9eagles
4/7/2023 10:04:00 AM

on question 10 and so far 2 wrong answers as evident in the included reference link.

T
Tai
8/28/2023 5:28:00 AM

wonderful material

V
VoiceofMidnight
12/29/2023 4:48:00 PM

i passed!! ...but barely! got 728, but needed 720 to pass. the exam hit me with labs right out of the gate! then it went to multiple choice. protip: study the labs!

A
A K
8/3/2023 11:56:00 AM

correct answer for question 92 is c -aws shield

N
Nitin Mindhe
11/27/2023 6:12:00 AM

great !! it is really good

B
BailleyOne
11/22/2023 1:45:00 AM

explanations for the answers are to the point.

P
patel
10/25/2023 8:17:00 AM

how can rea next

M
MortonG
10/19/2023 6:32:00 PM

question: 128 d is the wrong answer...should be c

J
Jayant
11/2/2023 3:15:00 AM

thanks for az 700 dumps

B
Bipul Mishra
12/14/2023 7:12:00 AM

thank you for this tableau dumps . it will helpfull for tableau certification

H
hello
10/31/2023 12:07:00 PM

good content

M
Matheus
9/3/2023 2:14:00 PM

just testing if the comments are real

Y
yenvti2@gmail.com
8/12/2023 7:56:00 PM

very helpful for exam preparation

M
Miguel
10/5/2023 12:16:00 PM

question 11: https://help.salesforce.com/s/articleview?id=sf.admin_lead_to_patient_setup_overview.htm&type=5

AI Tutor 👋 I’m here to help!