Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 17 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 41

Which of the following would be best suited to oversee the development of an information security policy?

A.

System Administrators

B.

End User

C.

Security Officers

D.

Security administrators

Question # 42

Authentication Headers (AH) and Encapsulating Security Payload (ESP) protocols are the driving force of IPSec. Authentication Headers (AH) provides the following service except:

A.

Authentication

B.

Integrity

C.

Replay resistance and non-repudiations

D.

Confidentiality

Question # 43

Which of the following is a device that is used to regenerate or replicate the received signals?

A.

Bridge

B.

Router

C.

Repeater

D.

Brouter

Question # 44

Which of the following statements pertaining to firewalls is incorrect?

A.

Firewalls create bottlenecks between the internal and external network.

B.

Firewalls allow for centralization of security services in machines optimized and dedicated to the task.

C.

Firewalls protect a network at all layers of the OSI models.

D.

Firewalls are used to create security checkpoints at the boundaries of private networks.

Question # 45

Which Network Address Translation (NAT) is the most convenient and secure solution?

A.

Hiding Network Address Translation

B.

Port Address Translation

C.

Dedicated Address Translation

D.

Static Address Translation

Question # 46

Which of the following is based on the premise that the quality of a software product is a direct function of the quality of its associated software development and maintenance processes?

A.

The Software Capability Maturity Model (CMM)

B.

The Spiral Model

C.

The Waterfall Model

D.

Expert Systems Model

Question # 47

Which of the following is a tool often used to reduce the risk to a local area network (LAN) that has external connections by filtering Ingress and Egress traffic?

A.

a firewall.

B.

dial-up.

C.

passwords.

D.

fiber optics.

Question # 48

What is the main issue with media reuse?

A.

Degaussing

B.

Data remanence

C.

Media destruction

D.

Purging

Question # 49

Which protocol is used to send email?

A.

File Transfer Protocol (FTP).

B.

Post Office Protocol (POP).

C.

Network File System (NFS).

D.

Simple Mail Transfer Protocol (SMTP).

Question # 50

In stateful inspection firewalls, packets are:

A.

Inspected at only one layer of the Open System Interconnection (OSI) model

B.

Inspected at all Open System Interconnection (OSI) layers

C.

Decapsulated at all Open Systems Interconnect (OSI) layers.

D.

Encapsulated at all Open Systems Interconnect (OSI) layers.

Question # 51

ICMP and IGMP belong to which layer of the OSI model?

A.

Datagram Layer.

B.

Network Layer.

C.

Transport Layer.

D.

Data Link Layer.

Question # 52

If any server in the cluster crashes, processing continues transparently, however, the cluster suffers some performance degradation. This implementation is sometimes called a:

A.

server farm

B.

client farm

C.

cluster farm

D.

host farm

Question # 53

What is the primary reason why some sites choose not to implement Trivial File Transfer Protocol (TFTP)?

A.

It is too complex to manage user access restrictions under TFTP

B.

Due to the inherent security risks

C.

It does not offer high level encryption like FTP

D.

It cannot support the Lightwight Directory Access Protocol (LDAP)

Question # 54

What is the framing specification used for transmitting digital signals at 1.544 Mbps on a T1 facility?

A.

DS-0

B.

DS-1

C.

DS-2

D.

DS-3

Question # 55

A X.509 public key certificate with the key usage attribute " non repudiation " can be used for which of the following?

A.

encrypting messages

B.

signing messages

C.

verifying signed messages

D.

decrypt encrypted messages

Question # 56

Which of the following is true about digital certificate?

A.

It is the same as digital signature proving Integrity and Authenticity of the data

B.

Electronic credential proving that the person the certificate was issued to is who they claim to be

C.

You can only get digital certificate from Verisign, RSA if you wish to prove the key belong to a specific user.

D.

Can ' t contain geography data such as country for example.

Question # 57

Which of the following computer recovery sites is only partially equipped with processing equipment?

A.

hot site

B.

rolling hot site

C.

warm site

D.

cold site

Question # 58

Which of the following server contingency solutions offers the highest availability?

A.

System backups

B.

Electronic vaulting/remote journaling

C.

Redundant arrays of independent disks (RAID)

D.

Load balancing/disk replication

Question # 59

Under United States law, an investigator ' s notebook may be used in court in which of the following scenarios?

A.

When the investigator is unwilling to testify.

B.

When other forms of physical evidence are not available.

C.

To refresh the investigators memory while testifying.

D.

If the defense has no objections.

Question # 60

Which of the following access control techniques best gives the security officers the ability to specify and enforce enterprise-specific security policies in a way that maps naturally to an organization ' s structure?

A.

Access control lists

B.

Discretionary access control

C.

Role-based access control

D.

Non-mandatory access control

Go to page: