Labour Day Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 2493360325

Good News !!! SSCP Systems Security Certified Practitioner is now Stable and With Pass Result

SSCP Practice Exam Questions and Answers

Systems Security Certified Practitioner

Last Update 13 hours ago
Total Questions : 1074

Systems Security Certified Practitioner is stable now with all latest exam questions are added 13 hours ago. Incorporating SSCP practice exam questions into your study plan is more than just a preparation strategy.

By familiarizing yourself with the Systems Security Certified Practitioner exam format, identifying knowledge gaps, applying theoretical knowledge in ISC practical scenarios, you are setting yourself up for success. SSCP exam dumps provide a realistic preview, helping you to adapt your preparation strategy accordingly.

SSCP exam questions often include scenarios and problem-solving exercises that mirror real-world challenges. Working through SSCP dumps allows you to practice pacing yourself, ensuring that you can complete all Systems Security Certified Practitioner exam questions within the allotted time frame without sacrificing accuracy.

SSCP PDF

SSCP PDF (Printable)
$48
$119.99

SSCP Testing Engine

SSCP PDF (Printable)
$56
$139.99

SSCP PDF + Testing Engine

SSCP PDF (Printable)
$70.8
$176.99
Question # 1

This type of supporting evidence is used to help prove an idea or a point, however It cannot stand on its own, it is used as a supplementary tool to help prove a primary piece of evidence. What is the name of this type of evidence?

Options:

A.  

Circumstantial evidence

B.  

Corroborative evidence

C.  

Opinion evidence

D.  

Secondary evidence

Discussion 0
Question # 2

Which of the following best allows risk management results to be used knowledgeably?

Options:

A.  

A vulnerability analysis

B.  

A likelihood assessment

C.  

An uncertainty analysis

D.  

A threat identification

Discussion 0
Question # 3

Which of the following is defined as the most recent point in time to which data must be synchronized without adversely affecting the organization (financial or operational impacts)?

Options:

A.  

Recovery Point Objective

B.  

Recovery Time Objective

C.  

Point of Time Objective

D.  

Critical Time Objective

Discussion 0
Question # 4

Which of the following recovery plan test results would be most useful to management?

Options:

A.  

elapsed time to perform various activities.

B.  

list of successful and unsuccessful activities.

C.  

amount of work completed.

D.  

description of each activity.

Discussion 0
Question # 5

The MOST common threat that impacts a business's ability to function normally is:

Options:

A.  

Power Outage

B.  

Water Damage

C.  

Severe Weather

D.  

Labor Strike

Discussion 0
Question # 6

Which of the following statements pertaining to quantitative risk analysis is false?

Options:

A.  

Portion of it can be automated

B.  

It involves complex calculations

C.  

It requires a high volume of information

D.  

It requires little experience to apply

Discussion 0
Question # 7

Which of the following proves or disproves a specific act through oral testimony based on information gathered through the witness's five senses?

Options:

A.  

Direct evidence.

B.  

Circumstantial evidence.

C.  

Conclusive evidence.

D.  

Corroborative evidence.

Discussion 0
Question # 8

Which of the following is NOT a common category/classification of threat to an IT system?

Options:

A.  

Human

B.  

Natural

C.  

Technological

D.  

Hackers

Discussion 0
Question # 9

Which backup type run at regular intervals would take the least time to complete?

Options:

A.  

Full Backup

B.  

Differential Backup

C.  

Incremental Backup

D.  

Disk Mirroring

Discussion 0
Question # 10

Which of the following could be BEST defined as the likelihood of a threat agent taking advantage of a vulnerability?

Options:

A.  

A risk

B.  

A residual risk

C.  

An exposure

D.  

A countermeasure

Discussion 0
Question # 11

When you update records in multiple locations or you make a copy of the whole database at a remote location as a way to achieve the proper level of fault-tolerance and redundancy, it is knows as?

Options:

A.  

Shadowing

B.  

Data mirroring

C.  

Backup

D.  

Archiving

Discussion 0
Question # 12

The typical computer fraudsters are usually persons with which of the following characteristics?

Options:

A.  

They have had previous contact with law enforcement

B.  

They conspire with others

C.  

They hold a position of trust

D.  

They deviate from the accepted norms of society

Discussion 0
Question # 13

How often should tests and disaster recovery drills be performed?

Options:

A.  

At least once a quarter

B.  

At least once every 6 months

C.  

At least once a year

D.  

At least once every 2 years

Discussion 0
Question # 14

Which of the following categories of hackers poses the greatest threat?

Options:

A.  

Disgruntled employees

B.  

Student hackers

C.  

Criminal hackers

D.  

Corporate spies

Discussion 0
Question # 15

Which common backup method is the fastest on a daily basis?

Options:

A.  

Full backup method

B.  

Incremental backup method

C.  

Fast backup method

D.  

Differential backup method

Discussion 0
Question # 16

For which areas of the enterprise are business continuity plans required?

Options:

A.  

All areas of the enterprise.

B.  

The financial and information processing areas of the enterprise.

C.  

The operating areas of the enterprise.

D.  

The marketing, finance, and information processing areas.

Discussion 0
Question # 17

Which of the following computer recovery sites is the least expensive and the most difficult to test?

Options:

A.  

non-mobile hot site

B.  

mobile hot site

C.  

warm site

D.  

cold site

Discussion 0
Question # 18

When first analyzing an intrusion that has just been detected and confirming that it is a true positive, which of the following actions should be done as a first step if you wish to prosecute the attacker in court?

Options:

A.  

Back up the compromised systems.

B.  

Identify the attacks used to gain access.

C.  

Capture and record system information.

D.  

Isolate the compromised systems.

Discussion 0
Question # 19

A prolonged power supply that is below normal voltage is a:

Options:

A.  

brownout

B.  

blackout

C.  

surge

D.  

fault

Discussion 0
Question # 20

Which of the following enables the person responsible for contingency planning to focus risk management efforts and resources in a prioritized manner only on the identified risks?

Options:

A.  

Risk assessment

B.  

Residual risks

C.  

Security controls

D.  

Business units

Discussion 0
Question # 21

Business Continuity and Disaster Recovery Planning (Primarily) addresses the:

Options:

A.  

Availability of the CIA triad

B.  

Confidentiality of the CIA triad

C.  

Integrity of the CIA triad

D.  

Availability, Confidentiality and Integrity of the CIA triad

Discussion 0
Question # 22

Under the principle of culpable negligence, executives can be held liable for losses that result from computer system breaches if:

Options:

A.  

The company is not a multi-national company.

B.  

They have not exercised due care protecting computing resources.

C.  

They have failed to properly insure computer resources against loss.

D.  

The company does not prosecute the hacker that caused the breach.

Discussion 0
Question # 23

How should a risk be HANDLED when the cost of the countermeasure OUTWEIGHS the cost of the risk?

Options:

A.  

Reject the risk

B.  

Perform another risk analysis

C.  

Accept the risk

D.  

Reduce the risk

Discussion 0
Question # 24

The standard server port number for HTTP is which of the following?

Options:

A.  

81

B.  

80

C.  

8080

D.  

8180

Discussion 0
Question # 25

What is a packet sniffer?

Options:

A.  

It tracks network connections to off-site locations.

B.  

It monitors network traffic for illegal packets.

C.  

It scans network segments for cabling faults.

D.  

It captures network traffic for later analysis.

Discussion 0
Question # 26

At which OSI/ISO layer is an encrypted authentication between a client software package and a firewall performed?

Options:

A.  

Network layer

B.  

Session layer

C.  

Transport layer

D.  

Data link layer

Discussion 0
Question # 27

Which of the following is used to find the Media Access Control address (MAC) that matches with a known Internet Protocol (IP) address?

Options:

A.  

Address Resolution Protocol (ARP).

B.  

Reverse Address Resolution Protocol (RARP).

C.  

Internet Control Message protocol (ICMP).

D.  

User Datagram Protocol (UDP).

Discussion 0
Question # 28

Layer 4 of the OSI stack is known as:

Options:

A.  

the data link layer

B.  

the transport layer

C.  

the network layer

D.  

the presentation layer

Discussion 0
Question # 29

Secure Electronic Transaction (SET) and Secure HTTP (S-HTTP) operate at which layer of the OSI model?

Options:

A.  

Application Layer.

B.  

Transport Layer.

C.  

Session Layer.

D.  

Network Layer.

Discussion 0
Question # 30

What is called the access protection system that limits connections by calling back the number of a previously authorized location?

Options:

A.  

Sendback systems

B.  

Callback forward systems

C.  

Callback systems

D.  

Sendback forward systems

Discussion 0
Question # 31

Which of the following is an IP address that is private (i.e. reserved for internal networks, and not a valid address to use on the Internet)?

Options:

A.  

10.0.42.5

B.  

11.0.42.5

C.  

12.0.42.5

D.  

13.0.42.5

Discussion 0
Question # 32

Upon which of the following ISO/OSI layers does network address translation operate?

Options:

A.  

Transport layer

B.  

Session layer

C.  

Data link layer

D.  

Network layer

Discussion 0
Question # 33

Domain Name Service is a distributed database system that is used to map:

Options:

A.  

Domain Name to IP addresses.

B.  

MAC addresses to domain names.

C.  

MAC Address to IP addresses.

D.  

IP addresses to MAC Addresses.

Discussion 0
Question # 34

One of the following statements about the differences between PPTP and L2TP is NOT true

Options:

A.  

PPTP can run only on top of IP networks.

B.  

PPTP is an encryption protocol and L2TP is not.

C.  

L2TP works well with all firewalls and network devices that perform NAT.

D.  

L2TP supports AAA servers

Discussion 0
Question # 35

Packet Filtering Firewalls examines both the source and destination address of the:

Options:

A.  

incoming and outgoing data packets

B.  

outgoing data packets only

C.  

Incoming Data packets only

D.  

user data packet

Discussion 0
Question # 36

Which of the following technologies has been developed to support TCP/IP networking over low-speed serial interfaces?

Options:

A.  

ISDN

B.  

SLIP

C.  

xDSL

D.  

T1

Discussion 0
Question # 37

Which OSI/ISO layer is the Media Access Control (MAC) sublayer part of?

Options:

A.  

Transport layer

B.  

Network layer

C.  

Data link layer

D.  

Physical layer

Discussion 0
Question # 38

Which protocol of the TCP/IP suite addresses reliable data transport?

Options:

A.  

Transmission control protocol (TCP)

B.  

User datagram protocol (UDP)

C.  

Internet protocol (IP)

D.  

Internet control message protocol (ICMP)

Discussion 0
Question # 39

What can a packet filtering firewall also be called?

Options:

A.  

a scanning router

B.  

a shielding router

C.  

a sniffing router

D.  

a screening router

Discussion 0
Question # 40

Which of the following DoD Model layer provides non-repudiation services?

Options:

A.  

network layer.

B.  

application layer.

C.  

transport layer.

D.  

data link layer.

Discussion 0
Question # 41

Which of the following protocols is not implemented at the Internet layer of the TCP/IP protocol model?

Options:

A.  

User datagram protocol (UDP)

B.  

Internet protocol (IP)

C.  

Internet Group Management Protocol (IGMP)

D.  

Internet control message protocol (ICMP)

Discussion 0
Question # 42

What is called an attack where the attacker spoofs the source IP address in an ICMP ECHO broadcast packet so it seems to have originated at the victim's system, in order to flood it with REPLY packets?

Options:

A.  

SYN Flood attack

B.  

Smurf attack

C.  

Ping of Death attack

D.  

Denial of Service (DOS) attack

Discussion 0
Question # 43

Which ISO/OSI layer establishes the communications link between individual devices over a physical link or channel?

Options:

A.  

Transport layer

B.  

Network layer

C.  

Data link layer

D.  

Physical layer

Discussion 0
Question # 44

What is called an attack in which an attacker floods a system with connection requests but does not respond when the target system replies to those requests?

Options:

A.  

Ping of death attack

B.  

SYN attack

C.  

Smurf attack

D.  

Buffer overflow attack

Discussion 0
Question # 45

Another name for a VPN is a:

Options:

A.  

tunnel

B.  

one-time password

C.  

pipeline

D.  

bypass

Discussion 0
Question # 46

In the UTP category rating, the tighter the wind:

Options:

A.  

the higher the rating and its resistance against interference and crosstalk.

B.  

the slower the rating and its resistance against interference and attenuation.

C.  

the shorter the rating and its resistance against interference and attenuation.

D.  

the longer the rating and its resistance against interference and attenuation.

Discussion 0
Question # 47

In the context of Biometric authentication, what is a quick way to compare the accuracy of devices. In general, the device that have the lowest value would be the most accurate. Which of the following would be used to compare accuracy of devices?

Options:

A.  

the CER is used.

B.  

the FRR is used

C.  

the FAR is used

D.  

the FER is used

Discussion 0
Question # 48

To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:

Options:

A.  

Access Rules

B.  

Access Matrix

C.  

Identification controls

D.  

Access terminal

Discussion 0
Question # 49

Which of the following are additional access control objectives?

Options:

A.  

Consistency and utility

B.  

Reliability and utility

C.  

Usefulness and utility

D.  

Convenience and utility

Discussion 0
Question # 50

Which of the following is not a security goal for remote access?

Options:

A.  

Reliable authentication of users and systems

B.  

Protection of confidential data

C.  

Easy to manage access control to systems and network resources

D.  

Automated login for remote users

Discussion 0
Question # 51

Which access control type has a central authority that determine to what objects the subjects have access to and it is based on role or on the organizational security policy?

Options:

A.  

Mandatory Access Control

B.  

Discretionary Access Control

C.  

Non-Discretionary Access Control

D.  

Rule-based Access control

Discussion 0
Question # 52

Which of the following protection devices is used for spot protection within a few inches of the object, rather than for overall room security monitoring?

Options:

A.  

Wave pattern motion detectors

B.  

Capacitance detectors

C.  

Field-powered devices

D.  

Audio detectors

Discussion 0
Question # 53

What is called a sequence of characters that is usually longer than the allotted number for a password?

Options:

A.  

passphrase

B.  

cognitive phrase

C.  

anticipated phrase

D.  

Real phrase

Discussion 0
Question # 54

How should a doorway of a manned facility with automatic locks be configured?

Options:

A.  

It should be configured to be fail-secure.

B.  

It should be configured to be fail-safe.

C.  

It should have a door delay cipher lock.

D.  

It should not allow piggybacking.

Discussion 0
Question # 55

Which of the following access control models requires defining classification for objects?

Options:

A.  

Role-based access control

B.  

Discretionary access control

C.  

Identity-based access control

D.  

Mandatory access control

Discussion 0
Question # 56

Which of the following would be used to implement Mandatory Access Control (MAC)?

Options:

A.  

Clark-Wilson Access Control

B.  

Role-based access control

C.  

Lattice-based access control

D.  

User dictated access control

Discussion 0
Question # 57

Which security model uses division of operations into different parts and requires different users to perform each part?

Options:

A.  

Bell-LaPadula model

B.  

Biba model

C.  

Clark-Wilson model

D.  

Non-interference model

Discussion 0
Question # 58

In biometrics, "one-to-many" search against database of stored biometric images is done in:

Options:

A.  

Authentication

B.  

Identification

C.  

Identities

D.  

Identity-based access control

Discussion 0
Question # 59

A timely review of system access audit records would be an example of which of the basic security functions?

Options:

A.  

avoidance.

B.  

deterrence.

C.  

prevention.

D.  

detection.

Discussion 0
Question # 60

Like the Kerberos protocol, SESAME is also subject to which of the following?

Options:

A.  

timeslot replay

B.  

password guessing

C.  

symmetric key guessing

D.  

asymmetric key guessing

Discussion 0
Question # 61

Which of the following best ensures accountability of users for the actions taken within a system or domain?

Options:

A.  

Identification

B.  

Authentication

C.  

Authorization

D.  

Credentials

Discussion 0
Question # 62

Identification and authentication are the keystones of most access control systems. Identification establishes:

Options:

A.  

User accountability for the actions on the system.

B.  

Top management accountability for the actions on the system.

C.  

EDP department accountability for the actions of users on the system.

D.  

Authentication for actions on the system

Discussion 0
Question # 63

The three classic ways of authenticating yourself to the computer security software are: something you know, something you have, and something:

Options:

A.  

you need.

B.  

you read.

C.  

you are.

D.  

you do.

Discussion 0
Question # 64

Which of the following models does NOT include data integrity or conflict of interest?

Options:

A.  

Biba

B.  

Clark-Wilson

C.  

Bell-LaPadula

D.  

Brewer-Nash

Discussion 0
Question # 65

When a biometric system is used, which error type deals with the possibility of GRANTING access to impostors who should be REJECTED?

Options:

A.  

Type I error

B.  

Type II error

C.  

Type III error

D.  

Crossover error

Discussion 0
Question # 66

What can be defined as a table of subjects and objects indicating what actions individual subjects can take upon individual objects?

Options:

A.  

A capacity table

B.  

An access control list

C.  

An access control matrix

D.  

A capability table

Discussion 0
Question # 67

In Mandatory Access Control, sensitivity labels attached to object contain what information?

Options:

A.  

The item's classification

B.  

The item's classification and category set

C.  

The item's category

D.  

The items's need to know

Discussion 0
Question # 68

In the CIA triad, what does the letter A stand for?

Options:

A.  

Auditability

B.  

Accountability

C.  

Availability

D.  

Authentication

Discussion 0
Question # 69

Which of the following is not a physical control for physical security?

Options:

A.  

lighting

B.  

fences

C.  

training

D.  

facility construction materials

Discussion 0
Question # 70

What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?

Options:

A.  

Data fiddling

B.  

Data diddling

C.  

Salami techniques

D.  

Trojan horses

Discussion 0
Question # 71

Which of the following technologies is a target of XSS or CSS (Cross-Site Scripting) attacks?

Options:

A.  

Web Applications

B.  

Intrusion Detection Systems

C.  

Firewalls

D.  

DNS Servers

Discussion 0
Question # 72

What do the ILOVEYOU and Melissa virus attacks have in common?

Options:

A.  

They are both denial-of-service (DOS) attacks.

B.  

They have nothing in common.

C.  

They are both masquerading attacks.

D.  

They are both social engineering attacks.

Discussion 0
Question # 73

The high availability of multiple all-inclusive, easy-to-use hacking tools that do NOT require much technical knowledge has brought a growth in the number of which type of attackers?

Options:

A.  

Black hats

B.  

White hats

C.  

Script kiddies

D.  

Phreakers

Discussion 0
Question # 74

What is malware that can spread itself over open network connections?

Options:

A.  

Worm

B.  

Rootkit

C.  

Adware

D.  

Logic Bomb

Discussion 0
Question # 75

Java is not:

Options:

A.  

Object-oriented.

B.  

Distributed.

C.  

Architecture Specific.

D.  

Multithreaded.

Discussion 0
Question # 76

Which of the following computer crime is MORE often associated with INSIDERS?

Options:

A.  

IP spoofing

B.  

Password sniffing

C.  

Data diddling

D.  

Denial of service (DOS)

Discussion 0
Question # 77

Which of the following virus types changes some of its characteristics as it spreads?

Options:

A.  

Boot Sector

B.  

Parasitic

C.  

Stealth

D.  

Polymorphic

Discussion 0
Question # 78

Crackers today are MOST often motivated by their desire to:

Options:

A.  

Help the community in securing their networks.

B.  

Seeing how far their skills will take them.

C.  

Getting recognition for their actions.

D.  

Gaining Money or Financial Gains.

Discussion 0
Question # 79

In computing what is the name of a non-self-replicating type of malware program containing malicious code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it, when executed, carries out actions that are unknown to the person installing it, typically causing loss or theft of data, and possible system harm.

Options:

A.  

virus

B.  

worm

C.  

Trojan horse.

D.  

trapdoor

Discussion 0
Question # 80

Which virus category has the capability of changing its own code, making it harder to detect by anti-virus software?

Options:

A.  

Stealth viruses

B.  

Polymorphic viruses

C.  

Trojan horses

D.  

Logic bombs

Discussion 0
Question # 81

Virus scanning and content inspection of SMIME encrypted e-mail without doing any further processing is:

Options:

A.  

Not possible

B.  

Only possible with key recovery scheme of all user keys

C.  

It is possible only if X509 Version 3 certificates are used

D.  

It is possible only by "brute force" decryption

Discussion 0
Question # 82

The information security staff's participation in which of the following system development life cycle phases provides maximum benefit to the organization?

Options:

A.  

project initiation and planning phase

B.  

system design specifications phase

C.  

development and documentation phase

D.  

in parallel with every phase throughout the project

Discussion 0
Question # 83

The preliminary steps to security planning include all of the following EXCEPT which of the following?

Options:

A.  

Establish objectives.

B.  

List planning assumptions.

C.  

Establish a security audit function.

D.  

Determine alternate courses of action

Discussion 0
Question # 84

Risk reduction in a system development life-cycle should be applied:

Options:

A.  

Mostly to the initiation phase.

B.  

Mostly to the development phase.

C.  

Mostly to the disposal phase.

D.  

Equally to all phases.

Discussion 0
Question # 85

What can be defined as an abstract machine that mediates all access to objects by subjects to ensure that subjects have the necessary access rights and to protect objects from unauthorized access?

Options:

A.  

The Reference Monitor

B.  

The Security Kernel

C.  

The Trusted Computing Base

D.  

The Security Domain

Discussion 0
Question # 86

Which of the following statements pertaining to software testing is incorrect?

Options:

A.  

Unit testing should be addressed and considered when the modules are being designed.

B.  

Test data should be part of the specifications.

C.  

Testing should be performed with live data to cover all possible situations.

D.  

Test data generators can be used to systematically generate random test data that can be used to test programs.

Discussion 0
Question # 87

Which of the following is NOT an example of an operational control?

Options:

A.  

backup and recovery

B.  

Auditing

C.  

contingency planning

D.  

operations procedures

Discussion 0
Question # 88

What is RAD?

Options:

A.  

A development methodology

B.  

A project management technique

C.  

A measure of system complexity

D.  

Risk-assessment diagramming

Discussion 0
Question # 89

What is the act of obtaining information of a higher sensitivity by combining information from lower levels of sensitivity?

Options:

A.  

Polyinstantiation

B.  

Inference

C.  

Aggregation

D.  

Data mining

Discussion 0
Question # 90

Who is responsible for implementing user clearances in computer-based information systems at the B3 level of the TCSEC rating ?

Options:

A.  

Security administrators

B.  

Operators

C.  

Data owners

D.  

Data custodians

Discussion 0
Question # 91

What can best be defined as the sum of protection mechanisms inside the computer, including hardware, firmware and software?

Options:

A.  

Trusted system

B.  

Security kernel

C.  

Trusted computing base

D.  

Security perimeter

Discussion 0
Question # 92

Which of the following refers to the data left on the media after the media has been erased?

Options:

A.  

remanence

B.  

recovery

C.  

sticky bits

D.  

semi-hidden

Discussion 0
Question # 93

If an organization were to monitor their employees' e-mail, it should not:

Options:

A.  

Monitor only a limited number of employees.

B.  

Inform all employees that e-mail is being monitored.

C.  

Explain who can read the e-mail and how long it is backed up.

D.  

Explain what is considered an acceptable use of the e-mail system.

Discussion 0
Question # 94

Which of the following usually provides reliable, real-time information without consuming network or host resources?

Options:

A.  

network-based IDS

B.  

host-based IDS

C.  

application-based IDS

D.  

firewall-based IDS

Discussion 0
Question # 95

The fact that a network-based IDS reviews packets payload and headers enable which of the following?

Options:

A.  

Detection of denial of service

B.  

Detection of all viruses

C.  

Detection of data corruption

D.  

Detection of all password guessing attacks

Discussion 0
Question # 96

Which of the following is used to monitor network traffic or to monitor host audit logs in real time to determine violations of system security policy that have taken place?

Options:

A.  

Intrusion Detection System

B.  

Compliance Validation System

C.  

Intrusion Management System (IMS)

D.  

Compliance Monitoring System

Discussion 0
Question # 97

Which of the following are additional terms used to describe knowledge-based IDS and behavior-based IDS?

Options:

A.  

signature-based IDS and statistical anomaly-based IDS, respectively

B.  

signature-based IDS and dynamic anomaly-based IDS, respectively

C.  

anomaly-based IDS and statistical-based IDS, respectively

D.  

signature-based IDS and motion anomaly-based IDS, respectively.

Discussion 0
Question # 98

Which of the following is required in order to provide accountability?

Options:

A.  

Authentication

B.  

Integrity

C.  

Confidentiality

D.  

Audit trails

Discussion 0
Question # 99

Which of the following Intrusion Detection Systems (IDS) uses a database of attacks, known system vulnerabilities, monitoring current attempts to exploit those vulnerabilities, and then triggers an alarm if an attempt is found?

Options:

A.  

Knowledge-Based ID System

B.  

Application-Based ID System

C.  

Host-Based ID System

D.  

Network-Based ID System

Discussion 0
Question # 100

Which of the following would assist the most in Host Based intrusion detection?

Options:

A.  

audit trails.

B.  

access control lists.

C.  

security clearances

D.  

host-based authentication

Discussion 0
Question # 101

Which of the following types of Intrusion Detection Systems uses behavioral characteristics of a system’s operation or network traffic to draw conclusions on whether the traffic represents a risk to the network or host?

Options:

A.  

Network-based ID systems.

B.  

Anomaly Detection.

C.  

Host-based ID systems.

D.  

Signature Analysis.

Discussion 0
Question # 102

Which of the following best describes signature-based detection?

Options:

A.  

Compare source code, looking for events or sets of events that could cause damage to a system or network.

B.  

Compare system activity for the behaviour patterns of new attacks.

C.  

Compare system activity, looking for events or sets of events that match a predefined pattern of events that describe a known attack.

D.  

Compare network nodes looking for objects or sets of objects that match a predefined pattern of objects that may describe a known attack.

Discussion 0
Question # 103

Attributable data should be:

Options:

A.  

always traced to individuals responsible for observing and recording the data

B.  

sometimes traced to individuals responsible for observing and recording the data

C.  

never traced to individuals responsible for observing and recording the data

D.  

often traced to individuals responsible for observing and recording the data

Discussion 0
Question # 104

What would be considered the biggest drawback of Host-based Intrusion Detection systems (HIDS)?

Options:

A.  

It can be very invasive to the host operating system

B.  

Monitors all processes and activities on the host system only

C.  

Virtually eliminates limits associated with encryption

D.  

They have an increased level of visibility and control compared to NIDS

Discussion 0
Question # 105

Which of the following is most likely to be useful in detecting intrusions?

Options:

A.  

Access control lists

B.  

Security labels

C.  

Audit trails

D.  

Information security policies

Discussion 0
Question # 106

Which of the following questions are least likely to help in assessing controls covering audit trails?

Options:

A.  

Does the audit trail provide a trace of user actions?

B.  

Are incidents monitored and tracked until resolved?

C.  

Is access to online logs strictly controlled?

D.  

Is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?

Discussion 0
Question # 107

Several analysis methods can be employed by an IDS, each with its own strengths and weaknesses, and their applicability to any given situation should be carefully considered. There are two basic IDS analysis methods that exists. Which of the basic method is more prone to false positive?

Options:

A.  

Pattern Matching (also called signature analysis)

B.  

Anomaly Detection

C.  

Host-based intrusion detection

D.  

Network-based intrusion detection

Discussion 0
Question # 108

In an online transaction processing system (OLTP), which of the following actions should be taken when erroneous or invalid transactions are detected?

Options:

A.  

The transactions should be dropped from processing.

B.  

The transactions should be processed after the program makes adjustments.

C.  

The transactions should be written to a report and reviewed.

D.  

The transactions should be corrected and reprocessed.

Discussion 0
Question # 109

Which of the following is NOT a valid reason to use external penetration service firms rather than corporate resources?

Options:

A.  

They are more cost-effective

B.  

They offer a lack of corporate bias

C.  

They use highly talented ex-hackers

D.  

They ensure a more complete reporting

Discussion 0
Question # 110

What is the essential difference between a self-audit and an independent audit?

Options:

A.  

Tools used

B.  

Results

C.  

Objectivity

D.  

Competence

Discussion 0
Question # 111

In the process of gathering evidence from a computer attack, a system administrator took a series of actions which are listed below. Can you identify which one of these actions has compromised the whole evidence collection process?

Options:

A.  

Using a write blocker

B.  

Made a full-disk image

C.  

Created a message digest for log files

D.  

Displayed the contents of a folder

Discussion 0
Question # 112

Controls provide accountability for individuals who are accessing sensitive information. This accountability is accomplished:

Options:

A.  

through access control mechanisms that require identification and authentication and through the audit function.

B.  

through logical or technical controls involving the restriction of access to systems and the protection of information.

C.  

through logical or technical controls but not involving the restriction of access to systems and the protection of information.

D.  

through access control mechanisms that do not require identification and authentication and do not operate through the audit function.

Discussion 0
Question # 113

Who should measure the effectiveness of Information System security related controls in an organization?

Options:

A.  

The local security specialist

B.  

The business manager

C.  

The systems auditor

D.  

The central security manager

Discussion 0
Question # 114

What is the primary goal of setting up a honeypot?

Options:

A.  

To lure hackers into attacking unused systems

B.  

To entrap and track down possible hackers

C.  

To set up a sacrificial lamb on the network

D.  

To know when certain types of attacks are in progress and to learn about attack techniques so the network can be fortified.

Discussion 0
Question # 115

Which of the following are the two MOST common implementations of Intrusion Detection Systems?

Options:

A.  

Server-based and Host-based.

B.  

Network-based and Guest-based.

C.  

Network-based and Client-based.

D.  

Network-based and Host-based.

Discussion 0
Question # 116

What is the role of IKE within the IPsec protocol?

Options:

A.  

peer authentication and key exchange

B.  

data encryption

C.  

data signature

D.  

enforcing quality of service

Discussion 0
Question # 117

You work in a police department forensics lab where you examine computers for evidence of crimes. Your work is vital to the success of the prosecution of criminals.

One day you receive a laptop and are part of a two man team responsible for examining it together. However, it is lunch time and after receiving the laptop you leave it on your desk and you both head out to lunch.

What critical step in forensic evidence have you forgotten?

Options:

A.  

Chain of custody

B.  

Locking the laptop in your desk

C.  

Making a disk image for examination

D.  

Cracking the admin password with chntpw

Discussion 0
Question # 118

What is the name for a substitution cipher that shifts the alphabet by 13 places?

Options:

A.  

Caesar cipher

B.  

Polyalphabetic cipher

C.  

ROT13 cipher

D.  

Transposition cipher

Discussion 0
Question # 119

What kind of encryption is realized in the S/MIME-standard?

Options:

A.  

Asymmetric encryption scheme

B.  

Password based encryption scheme

C.  

Public key based, hybrid encryption scheme

D.  

Elliptic curve based encryption

Discussion 0
Question # 120

The Data Encryption Standard (DES) encryption algorithm has which of the following characteristics?

Options:

A.  

64 bits of data input results in 56 bits of encrypted output

B.  

128 bit key with 8 bits used for parity

C.  

64 bit blocks with a 64 bit total key length

D.  

56 bits of data input results in 56 bits of encrypted output

Discussion 0
Question # 121

What are the three most important functions that Digital Signatures perform?

Options:

A.  

Integrity, Confidentiality and Authorization

B.  

Integrity, Authentication and Nonrepudiation

C.  

Authorization, Authentication and Nonrepudiation

D.  

Authorization, Detection and Accountability

Discussion 0
Question # 122

What is the name of the protocol use to set up and manage Security Associations (SA) for IP Security (IPSec)?

Options:

A.  

Internet Key Exchange (IKE)

B.  

Secure Key Exchange Mechanism

C.  

Oakley

D.  

Internet Security Association and Key Management Protocol

Discussion 0
Question # 123

PGP uses which of the following to encrypt data?

Options:

A.  

An asymmetric encryption algorithm

B.  

A symmetric encryption algorithm

C.  

A symmetric key distribution system

D.  

An X.509 digital certificate

Discussion 0
Question # 124

What is a characteristic of using the Electronic Code Book mode of DES encryption?

Options:

A.  

A given block of plaintext and a given key will always produce the same ciphertext.

B.  

Repetitive encryption obscures any repeated patterns that may have been present in the plaintext.

C.  

Individual characters are encoded by combining output from earlier encryption routines with plaintext.

D.  

The previous DES output is used as input.

Discussion 0
Question # 125

The DES algorithm is an example of what type of cryptography?

Options:

A.  

Secret Key

B.  

Two-key

C.  

Asymmetric Key

D.  

Public Key

Discussion 0
Question # 126

Which of the following is an Internet IPsec protocol to negotiate, establish, modify, and delete security associations, and to exchange key generation and authentication data, independent of the details of any specific key generation technique, key establishment protocol, encryption algorithm, or authentication mechanism?

Options:

A.  

OAKLEY

B.  

Internet Security Association and Key Management Protocol (ISAKMP)

C.  

Simple Key-management for Internet Protocols (SKIP)

D.  

IPsec Key exchange (IKE)

Discussion 0
Question # 127

Which of the following encryption methods is known to be unbreakable?

Options:

A.  

Symmetric ciphers.

B.  

DES codebooks.

C.  

One-time pads.

D.  

Elliptic Curve Cryptography.

Discussion 0
Question # 128

Which of the following are suitable protocols for securing VPN connections at the lower layers of the OSI model?

Options:

A.  

S/MIME and SSH

B.  

TLS and SSL

C.  

IPsec and L2TP

D.  

PKCS#10 and X.509

Discussion 0
Question # 129

When we encrypt or decrypt data there is a basic operation involving ones and zeros where they are compared in a process that looks something like this:

0101 0001 Plain text

0111 0011 Key stream

0010 0010 Output

What is this cryptographic operation called?

Options:

A.  

Exclusive-OR

B.  

Bit Swapping

C.  

Logical-NOR

D.  

Decryption

Discussion 0
Question # 130

The RSA Algorithm uses which mathematical concept as the basis of its encryption?

Options:

A.  

Geometry

B.  

16-round ciphers

C.  

PI (3.14159...)

D.  

Two large prime numbers

Discussion 0
Question # 131

What can be defined as a value computed with a cryptographic algorithm and appended to a data object in such a way that any recipient of the data can use the signature to verify the data's origin and integrity?

Options:

A.  

A digital envelope

B.  

A cryptographic hash

C.  

A Message Authentication Code

D.  

A digital signature

Discussion 0
Question # 132

What level of assurance for a digital certificate verifies a user's name, address, social security number, and other information against a credit bureau database?

Options:

A.  

Level 1/Class 1

B.  

Level 2/Class 2

C.  

Level 3/Class 3

D.  

Level 4/Class 4

Discussion 0
Question # 133

Which of the following offers security to wireless communications?

Options:

A.  

S-WAP

B.  

WTLS

C.  

WSP

D.  

WDP

Discussion 0
Question # 134

Which of the following can be best defined as computing techniques for inseparably embedding unobtrusive marks or labels as bits in digital data and for detecting or extracting the marks later?

Options:

A.  

Steganography

B.  

Digital watermarking

C.  

Digital enveloping

D.  

Digital signature

Discussion 0
Question # 135

Which of the following encryption algorithms does not deal with discrete logarithms?

Options:

A.  

El Gamal

B.  

Diffie-Hellman

C.  

RSA

D.  

Elliptic Curve

Discussion 0
Question # 136

Which of the following protocols that provide integrity and authentication for IPSec, can also provide non-repudiation in IPSec?

Options:

A.  

Authentication Header (AH)

B.  

Encapsulating Security Payload (ESP)

C.  

Secure Sockets Layer (SSL)

D.  

Secure Shell (SSH-2)

Discussion 0
Question # 137

Public Key Infrastructure (PKI) uses asymmetric key encryption between parties. The originator encrypts information using the intended recipient's "public" key in order to get confidentiality of the data being sent. The recipients use their own "private" key to decrypt the information. The "Infrastructure" of this methodology ensures that:

Options:

A.  

The sender and recipient have reached a mutual agreement on the encryption key exchange that they will use.

B.  

The channels through which the information flows are secure.

C.  

The recipient's identity can be positively verified by the sender.

D.  

The sender of the message is the only other person with access to the recipient's private key.

Discussion 0
Question # 138

Cryptography does not concern itself with which of the following choices?

Options:

A.  

Availability

B.  

Integrity

C.  

Confidentiality

D.  

Validation

Discussion 0
Get SSCP dumps and pass your exam in 24 hours!

Free Exams Sample Questions