Appendix Answers to Review Questions

Chapter 1: Access Controls (Domain 1)

  1. B. Device authentication allows the venue to restrict network access to authorized scanners but does not require individual ushers to sign in to the device. This seems an acceptable level of security for this environment, as the scanners are carefully controlled. Moving to any authentication scheme that requires user authentication would be unwieldy.

  2. D. The purpose of an extranet is to allow outside organizations that are business partners to access limited resources on the corporate network. That describes the situation in this scenario, so Norma is building an extranet.

  3. B. A mandatory access control (MAC) scheme is an example of a nondiscretionary approach ...

Get (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.