Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 17 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 21

Asynchronous Communication transfers data by sending:

A.

bits of data sequentially

B.

bits of data sequentially in irregular timing patterns

C.

bits of data in sync with a heartbeat or clock

D.

bits of data simultaneously

Question # 22

What is the maximum length of cable that can be used for a twisted-pair, Category 5 10Base-T cable?

A.

80 meters

B.

100 meters

C.

185 meters

D.

500 meters

Question # 23

Which of the following remote access authentication systems is the most robust?

A.

TACACS+

B.

RADIUS

C.

PAP

D.

TACACS

Question # 24

In the Open Systems Interconnect (OSI) Reference Model, at what level are TCP and UDP provided?

A.

Transport

B.

Network

C.

Presentation

D.

Application

Question # 25

Which of the following is the simplest type of firewall ?

A.

Stateful packet filtering firewall

B.

Packet filtering firewall

C.

Dual-homed host firewall

D.

Application gateway

Question # 26

What can be defined as a momentary low voltage?

A.

Spike

B.

Sag

C.

Fault

D.

Brownout

Question # 27

Which of the following tasks is NOT usually part of a Business Impact Analysis (BIA)?

A.

Calculate the risk for each different business function.

B.

Identify the company’s critical business functions.

C.

Calculate how long these functions can survive without these resources.

D.

Develop a mission statement.

Question # 28

Which of the following statements regarding an off-site information processing facility is TRUE?

A.

It should have the same amount of physical access restrictions as the primary processing site.

B.

It should be located in proximity to the originating site so that it can quickly be made operational.

C.

It should be easily identified from the outside so in the event of an emergency it can be easily found.

D.

Need not have the same level of environmental monitoring as the originating site since this would be cost prohibitive.

Question # 29

Which of the following is the most complete disaster recovery plan test type, to be performed after successfully completing the Parallel test?

A.

Full Interruption test

B.

Checklist test

C.

Simulation test

D.

Structured walk-through test

Question # 30

Which of the following enables the person responsible for contingency planning to focus risk management efforts and resources in a prioritized manner only on the identified risks?

A.

Risk assessment

B.

Residual risks

C.

Security controls

D.

Business units

Question # 31

Which of the following is less likely to accompany a contingency plan, either within the plan itself or in the form of an appendix?

A.

Contact information for all personnel.

B.

Vendor contact information, including offsite storage and alternate site.

C.

Equipment and system requirements lists of the hardware, software, firmware and other resources required to support system operations.

D.

The Business Impact Analysis.

Question # 32

What can be defined as the maximum acceptable length of time that elapses before the unavailability of the system severely affects the organization?

A.

Recovery Point Objectives (RPO)

B.

Recovery Time Objectives (RTO)

C.

Recovery Time Period (RTP)

D.

Critical Recovery Time (CRT)

Question # 33

What assesses potential loss that could be caused by a disaster?

A.

The Business Assessment (BA)

B.

The Business Impact Analysis (BIA)

C.

The Risk Assessment (RA)

D.

The Business Continuity Plan (BCP)

Question # 34

Which backup method usually resets the archive bit on the files after they have been backed up?

A.

Incremental backup method.

B.

Differential backup method.

C.

Partial backup method.

D.

Tape backup method.

Question # 35

Failure of a contingency plan is usually:

A.

A technical failure.

B.

A management failure.

C.

Because of a lack of awareness.

D.

Because of a lack of training.

Question # 36

Which of the following statements pertaining to a security policy is incorrect?

A.

Its main purpose is to inform the users, administrators and managers of their obligatory requirements for protecting technology and information assets.

B.

It specifies how hardware and software should be used throughout the organization.

C.

It needs to have the acceptance and support of all levels of employees within the organization in order for it to be appropriate and effective.

D.

It must be flexible to the changing environment.

Question # 37

Which of the following networking devices allows the connection of two or more homogeneous LANs in a simple way where they forward the traffic based on the MAC address ?

A.

Gateways

B.

Routers

C.

Bridges

D.

Firewalls

Question # 38

What is the 802.11 standard related to?

A.

Public Key Infrastructure (PKI)

B.

Wireless network communications

C.

Packet-switching technology

D.

The OSI/ISO model

Question # 39

Which layer of the DoD TCP/IP model controls the communication flow between hosts?

A.

Internet layer

B.

Host-to-host transport layer

C.

Application layer

D.

Network access layer

Question # 40

Which of the following media is MOST resistant to tapping?

A.

microwave.

B.

twisted pair.

C.

coaxial cable.

D.

fiber optic.

Go to page: