Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 17 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 61

Examples of types of physical access controls include all EXCEPT which of the following?

A.

badges

B.

locks

C.

guards

D.

passwords

Question # 62

What is called the formal acceptance of the adequacy of a system ' s overall security by the management?

A.

Certification

B.

Acceptance

C.

Accreditation

D.

Evaluation

Question # 63

Which of the following statements pertaining to disaster recovery is incorrect?

A.

A recovery team ' s primary task is to get the pre-defined critical business functions at the alternate backup processing site.

B.

A salvage team ' s task is to ensure that the primary site returns to normal processing conditions.

C.

The disaster recovery plan should include how the company will return from the alternate site to the primary site.

D.

When returning to the primary site, the most critical applications should be brought back first.

Question # 64

Which of the following is the most critical item from a disaster recovery point of view?

A.

Data

B.

Hardware/Software

C.

Communication Links

D.

Software Applications

Question # 65

Which of the following is not a method to protect objects and the data within the objects?

A.

Layering

B.

Data mining

C.

Abstraction

D.

Data hiding

Question # 66

Which of the following algorithms is a stream cipher?

A.

RC2

B.

RC4

C.

RC5

D.

RC6

Question # 67

Which of the following is NOT a common integrity goal?

A.

Prevent unauthorized users from making modifications.

B.

Maintain internal and external consistency.

C.

Prevent authorized users from making improper modifications.

D.

Prevent paths that could lead to inappropriate disclosure.

Question # 68

At which OSI/ISO layer is an encrypted authentication between a client software package and a firewall performed?

A.

Network layer

B.

Session layer

C.

Transport layer

D.

Data link layer

Question # 69

Which of the following statements pertaining to access control is false?

A.

Users should only access data on a need-to-know basis.

B.

If access is not explicitly denied, it should be implicitly allowed.

C.

Access rights should be granted based on the level of trust a company has on a subject.

D.

Roles can be an efficient way to assign rights to a type of user who performs certain tasks.

Question # 70

Notifying the appropriate parties to take action in order to determine the extent of the severity of an incident and to remediate the incident ' s effects is part of:

A.

Incident Evaluation

B.

Incident Recognition

C.

Incident Protection

D.

Incident Response

Question # 71

What works as an E-mail message transfer agent?

A.

SMTP

B.

SNMP

C.

S-RPC

D.

S/MIME

Question # 72

Which of the following offers confidentiality to an e-mail message?

A.

The sender encrypting it with its private key.

B.

The sender encrypting it with its public key.

C.

The sender encrypting it with the receiver ' s public key.

D.

The sender encrypting it with the receiver ' s private key.

Question # 73

What is called the probability that a threat to an information system will materialize?

A.

Threat

B.

Risk

C.

Vulnerability

D.

Hole

Question # 74

Which of the following statements pertaining to disk mirroring is incorrect?

A.

Mirroring offers better performance in read operations but writing hinders system performance.

B.

Mirroring is a hardware-based solution only.

C.

Mirroring offers a higher fault tolerance than parity.

D.

Mirroring is usually the less cost-effective solution.

Question # 75

Which of the following is the most secure firewall implementation?

A.

Dual-homed host firewalls

B.

Screened-subnet firewalls

C.

Screened-host firewalls

D.

Packet-filtering firewalls

Question # 76

Each data packet is assigned the IP address of the sender and the IP address of the:

A.

recipient.

B.

host.

C.

node.

D.

network.

Question # 77

As per RFC 1122, which of the following is not a defined layer in the DoD TCP/IP protocol model?

A.

Application layer

B.

Session layer

C.

Internet layer

D.

Link/Network Access Layer

Question # 78

What layer of the ISO/OSI model do routers normally operate at?

A.

Data link layer

B.

Session layer

C.

Transport layer

D.

Network layer

Question # 79

Which of the following is an example of a connectionless communication protocol?

A.

UDP

B.

X.25

C.

Packet switching

D.

TCP

Question # 80

What ISO/OSI layer do switches primarily operate at?

Do take note that this question makes reference to a plain vanilla switch and not one of the smart switches that is available on the market today.

A.

Physical layer

B.

Network layer

C.

Data link layer

D.

Session layer

Go to page: