Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 17 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 181

Which of the following is not a logical control when implementing logical access security?

A.

access profiles.

B.

userids.

C.

employee badges.

D.

passwords.

Question # 182

Which of the following is implemented through scripts or smart agents that replays the users multiple log-ins against authentication servers to verify a user ' s identity which permit access to system services?

A.

Single Sign-On

B.

Dynamic Sign-On

C.

Smart cards

D.

Kerberos

Question # 183

Which of the following would be LESS likely to prevent an employee from reporting an incident?

A.

They are afraid of being pulled into something they don ' t want to be involved with.

B.

The process of reporting incidents is centralized.

C.

They are afraid of being accused of something they didn ' t do.

D.

They are unaware of the company ' s security policies and procedures.

Question # 184

A timely review of system access audit records would be an example of which of the basic security functions?

A.

avoidance

B.

deterrence

C.

prevention

D.

detection

Question # 185

Which of the following tools is NOT likely to be used by a hacker?

A.

Nessus

B.

Saint

C.

Tripwire

D.

Nmap

Question # 186

Which of the following is NOT a characteristic of a host-based intrusion detection system?

A.

A HIDS does not consume large amounts of system resources

B.

A HIDS can analyse system logs, processes and resources

C.

A HIDS looks for unauthorized changes to the system

D.

A HIDS can notify system administrators when unusual events are identified

Question # 187

What is the act of obtaining information of a higher sensitivity by combining information from lower levels of sensitivity?

A.

Polyinstantiation

B.

Inference

C.

Aggregation

D.

Data mining

Question # 188

Which of the following would be the best criterion to consider in determining the classification of an information asset?

A.

Value

B.

Age

C.

Useful life

D.

Personal association

Question # 189

Which of the following is NOT a proper component of Media Viability Controls?

A.

Storage

B.

Writing

C.

Handling

D.

Marking

Question # 190

What security problem is most likely to exist if an operating system permits objects to be used sequentially by multiple users without forcing a refresh of the objects?

A.

Disclosure of residual data.

B.

Unauthorized obtaining of a privileged execution state.

C.

Denial of service through a deadly embrace.

D.

Data leakage through covert channels.

Question # 191

Which of the following refers to the data left on the media after the media has been erased?

A.

remanence

B.

recovery

C.

sticky bits

D.

semi-hidden

Question # 192

Which of the following is not appropriate in addressing object reuse?

A.

Degaussing magnetic tapes when they ' re no longer needed.

B.

Deleting files on disk before reusing the space.

C.

Clearing memory blocks before they are allocated to a program or data.

D.

Clearing buffered pages, documents, or screens from the local memory of a terminal or printer.

Question # 193

Who of the following is responsible for ensuring that proper controls are in place to address integrity, confidentiality, and availability of IT systems and data?

A.

Business and functional managers

B.

IT Security practitioners

C.

System and information owners

D.

Chief information officer

Question # 194

When attempting to establish Liability, which of the following would be describe as performing the ongoing maintenance necessary to keep something in proper working order, updated, effective, or to abide by what is commonly expected in a situation?

A.

Due care

B.

Due concern

C.

Due diligence

D.

Due practice

Question # 195

To control access by a subject (an active entity such as individual or process) to an object (a passive entity such as a file) involves setting up:

A.

Access Rules

B.

Access Matrix

C.

Identification controls

D.

Access terminal

Question # 196

What is called the type of access control where there are pairs of elements that have the least upper bound of values and greatest lower bound of values?

A.

Mandatory model

B.

Discretionary model

C.

Lattice model

D.

Rule model

Question # 197

Which of the following is NOT a compensating measure for access violations?

A.

Backups

B.

Business continuity planning

C.

Insurance

D.

Security awareness

Question # 198

Which of the following is not a security goal for remote access?

A.

Reliable authentication of users and systems

B.

Protection of confidential data

C.

Easy to manage access control to systems and network resources

D.

Automated login for remote users

Question # 199

Which of the following is the FIRST step in protecting data ' s confidentiality?

A.

Install a firewall

B.

Implement encryption

C.

Identify which information is sensitive

D.

Review all user access rights

Question # 200

Which of the following describes the major disadvantage of many Single Sign-On (SSO) implementations?

A.

Once an individual obtains access to the system through the initial log-on, they have access to all resources within the environment that the account has access to.

B.

The initial logon process is cumbersome to discourage potential intruders.

C.

Once a user obtains access to the system through the initial log-on, they only need to logon to some applications.

D.

Once a user obtains access to the system through the initial log-on, he has to logout from all other systems

Go to page: