Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 17 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 101

Which of the following questions are least likely to help in assessing controls covering audit trails?

A.

Does the audit trail provide a trace of user actions?

B.

Are incidents monitored and tracked until resolved?

C.

Is access to online logs strictly controlled?

D.

Is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?

Question # 102

Most access violations are:

A.

Accidental

B.

Caused by internal hackers

C.

Caused by external hackers

D.

Related to Internet

Question # 103

Which of the following best describes remote journaling?

A.

Send hourly tapes containing transactions off-site.

B.

Send daily tapes containing transactions off-site.

C.

Real-time capture of transactions to multiple storage devices.

D.

Real time transmission of copies of the entries in the journal of transactions to an alternate site.

Question # 104

The absence of a safeguard, or a weakness in a system that may possibly be exploited is called a(n)?

A.

Threat

B.

Exposure

C.

Vulnerability

D.

Risk

Question # 105

What is called an event or activity that has the potential to cause harm to the information systems or networks?

A.

Vulnerability

B.

Threat agent

C.

Weakness

D.

Threat

Question # 106

Which of the following best defines a Computer Security Incident Response Team (CSIRT)?

A.

An organization that provides a secure channel for receiving reports about suspected security incidents.

B.

An organization that ensures that security incidents are reported to the authorities.

C.

An organization that coordinates and supports the response to security incidents.

D.

An organization that disseminates incident-related information to its constituency and other involved parties.

Question # 107

Due care is not related to:

A.

Good faith

B.

Prudent man

C.

Profit

D.

Best interest

Question # 108

Which of the following would best describe the difference between white-box testing and black-box testing?

A.

White-box testing is performed by an independent programmer team.

B.

Black-box testing uses the bottom-up approach.

C.

White-box testing examines the program internal logical structure.

D.

Black-box testing involves the business units

Question # 109

Preservation of confidentiality within information systems requires that the information is not disclosed to:

A.

Authorized person

B.

Unauthorized persons or processes.

C.

Unauthorized persons.

D.

Authorized persons and processes

Question # 110

When a possible intrusion into your organization ' s information system has been detected, which of the following actions should be performed first?

A.

Eliminate all means of intruder access.

B.

Contain the intrusion.

C.

Determine to what extent systems and data are compromised.

D.

Communicate with relevant parties.

Question # 111

Which of the following is the best reason for the use of an automated risk analysis tool?

A.

Much of the data gathered during the review cannot be reused for subsequent analysis.

B.

Automated methodologies require minimal training and knowledge of risk analysis.

C.

Most software tools have user interfaces that are easy to use and does not require any training.

D.

Information gathering would be minimized and expedited due to the amount of information already built into the tool.

Question # 112

Which of the following was designed as a more fault-tolerant topology than Ethernet, and very resilient when properly implemented?

A.

Token Link.

B.

Token system.

C.

Token Ring.

D.

Duplicate ring.

Question # 113

Which of the following category of UTP cables is specified to be able to handle gigabit Ethernet (1 Gbps) according to the EIA/TIA-568-B standards?

A.

Category 5e UTP

B.

Category 2 UTP

C.

Category 3 UTP

D.

Category 1e UTP

Question # 114

What kind of Encryption technology does SSL utilize?

A.

Secret or Symmetric key

B.

Hybrid (both Symmetric and Asymmetric)

C.

Public Key

D.

Private key

Question # 115

What is the maximum allowable key size of the Rijndael encryption algorithm?

A.

128 bits

B.

192 bits

C.

256 bits

D.

512 bits

Question # 116

Which of the following is the primary security feature of a proxy server?

A.

Virus Detection

B.

URL blocking

C.

Route blocking

D.

Content filtering

Question # 117

Which type of attack involves the alteration of a packet at the IP level to convince a system that it is communicating with a known entity in order to gain access to a system?

A.

TCP sequence number attack

B.

IP spoofing attack

C.

Piggybacking attack

D.

Teardrop attack

Question # 118

What is defined as the rules for communicating between computers on a Local Area Network (LAN)?

A.

LAN Media Access methods

B.

LAN topologies

C.

LAN transmission methods

D.

Contention Access Control

Question # 119

Which of the following is true about link encryption?

A.

Each entity has a common key with the destination node.

B.

Encrypted messages are only decrypted by the final node.

C.

This mode does not provide protection if anyone of the nodes along the transmission path is compromised.

D.

Only secure nodes are used in this type of transmission.

Question # 120

The session layer provides a logical persistent connection between peer hosts. Which of the following is one of the modes used in the session layer to establish this connection?

A.

Full duplex

B.

Synchronous

C.

Asynchronous

D.

Half simplex

Go to page: