Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 17 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 81

A circuit level proxy is ___________________ when compared to an application level proxy.

A.

lower in processing overhead.

B.

more difficult to maintain.

C.

more secure.

D.

slower.

Question # 82

What is the PRIMARY reason to maintain the chain of custody on evidence that has been collected?

A.

To ensure that no evidence is lost.

B.

To ensure that all possible evidence is gathered.

C.

To ensure that it will be admissible in court

D.

To ensure that incidents were handled with due care and due diligence.

Question # 83

Which of the following is NOT a correct notation for an IPv6 address?

A.

2001:0db8:0:0:0:0:1428:57ab

B.

ABCD:EF01:2345:6789:ABCD:EF01:2345:6789

C.

::1

D.

2001:DB8::8:800::417A

Question # 84

Which type of algorithm is considered to have the highest strength per bit of key length of any of the asymmetric algorithms?

A.

Rivest, Shamir, Adleman (RSA)

B.

El Gamal

C.

Elliptic Curve Cryptography (ECC)

D.

Advanced Encryption Standard (AES)

Question # 85

A prolonged complete loss of electric power is a:

A.

brownout

B.

blackout

C.

surge

D.

fault

Question # 86

Which of the following items is NOT a benefit of cold sites?

A.

No resource contention with other organisation

B.

Quick Recovery

C.

A secondary location is available to reconstruct the environment

D.

Low Cost

Question # 87

What can best be described as an abstract machine which must mediate all access to subjects to objects?

A.

A security domain

B.

The reference monitor

C.

The security kernel

D.

The security perimeter

Question # 88

Which of the following best describes the purpose of debugging programs?

A.

To generate random data that can be used to test programs before implementing them.

B.

To ensure that program coding flaws are detected and corrected.

C.

To protect, during the programming phase, valid changes from being overwritten by other changes.

D.

To compare source code versions before transferring to the test environment

Question # 89

Why does compiled code pose more of a security risk than interpreted code?

A.

Because malicious code can be embedded in compiled code and be difficult to detect.

B.

If the executed compiled code fails, there is a chance it will fail insecurely.

C.

Because compilers are not reliable.

D.

There is no risk difference between interpreted code and compiled code.

Question # 90

The typical computer fraudsters are usually persons with which of the following characteristics?

A.

They have had previous contact with law enforcement

B.

They conspire with others

C.

They hold a position of trust

D.

They deviate from the accepted norms of society

Question # 91

What can be defined as a data structure that enumerates digital certificates that were issued to CAs but have been invalidated by their issuer prior to when they were scheduled to expire?

A.

Certificate revocation list

B.

Certificate revocation tree

C.

Authority revocation list

D.

Untrusted certificate list

Question # 92

A central authority determines what subjects can have access to certain objects based on the organizational security policy is called:

A.

Mandatory Access Control

B.

Discretionary Access Control

C.

Non-Discretionary Access Control

D.

Rule-based Access control

Question # 93

A timely review of system access audit records would be an example of which of the basic security functions?

A.

avoidance.

B.

deterrence.

C.

prevention.

D.

detection.

Question # 94

An alternative to using passwords for authentication in logical or technical access control is:

A.

manage without passwords

B.

biometrics

C.

not there

D.

use of them for physical access control

Question # 95

In response to Access-request from a client such as a Network Access Server (NAS), which of the following is not one of the response from a RADIUS Server?

A.

Access-Accept

B.

Access-Reject

C.

Access-Granted

D.

Access-Challenge

Question # 96

Which of the following is used by RADIUS for communication between clients and servers?

A.

TCP

B.

SSL

C.

UDP

D.

SSH

Question # 97

In an organization where there are frequent personnel changes, non-discretionary access control using Role Based Access Control (RBAC) is useful because:

A.

people need not use discretion

B.

the access controls are based on the individual ' s role or title within the organization.

C.

the access controls are not based on the individual ' s role or title within the organization

D.

the access controls are often based on the individual ' s role or title within the organization

Question # 98

Which of the following is the LEAST user accepted biometric device?

A.

Fingerprint

B.

Iris scan

C.

Retina scan

D.

Voice verification

Question # 99

How should a doorway of a manned facility with automatic locks be configured?

A.

It should be configured to be fail-secure.

B.

It should be configured to be fail-safe.

C.

It should have a door delay cipher lock.

D.

It should not allow piggybacking.

Question # 100

Which of the following usually provides reliable, real-time information without consuming network or host resources?

A.

network-based IDS

B.

host-based IDS

C.

application-based IDS

D.

firewall-based IDS

Go to page: