Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 17 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 121

Which of the following is NOT a fundamental component of an alarm in an intrusion detection system?

A.

Communications

B.

Enunciator

C.

Sensor

D.

Response

Question # 122

What attribute is included in a X.509-certificate?

A.

Distinguished name of the subject

B.

Telephone number of the department

C.

secret key of the issuing CA

D.

the key pair of the certificate holder

Question # 123

What is the primary role of cross certification?

A.

Creating trust between different PKIs

B.

Build an overall PKI hierarchy

C.

set up direct trust to a second root CA

D.

Prevent the nullification of user certificates by CA certificate revocation

Question # 124

In the context of network enumeration by an outside attacker and possible Distributed Denial of Service (DDoS) attacks, which of the following firewall rules is not appropriate to protect an organization ' s internal network?

A.

Allow echo reply outbound

B.

Allow echo request outbound

C.

Drop echo request inbound

D.

Allow echo reply inbound

Question # 125

What is a decrease in amplitude as a signal propagates along a transmission medium best known as?

A.

Crosstalk

B.

Noise

C.

Delay distortion

D.

Attenuation

Question # 126

A Business Continuity Plan should be tested:

A.

Once a month.

B.

At least twice a year.

C.

At least once a year.

D.

At least once every two years.

Question # 127

What is malware that can spread itself over open network connections?

A.

Worm

B.

Rootkit

C.

Adware

D.

Logic Bomb

Question # 128

Java is not:

A.

Object-oriented.

B.

Distributed.

C.

Architecture Specific.

D.

Multithreaded.

Question # 129

Crackers today are MOST often motivated by their desire to:

A.

Help the community in securing their networks.

B.

Seeing how far their skills will take them.

C.

Getting recognition for their actions.

D.

Gaining Money or Financial Gains.

Question # 130

Which of the following computer crime is MORE often associated with INSIDERS?

A.

IP spoofing

B.

Password sniffing

C.

Data diddling

D.

Denial of service (DOS)

Question # 131

Which of the following technologies is a target of XSS or CSS (Cross-Site Scripting) attacks?

A.

Web Applications

B.

Intrusion Detection Systems

C.

Firewalls

D.

DNS Servers

Question # 132

Which of the following virus types changes some of its characteristics as it spreads?

A.

Boot Sector

B.

Parasitic

C.

Stealth

D.

Polymorphic

Question # 133

In computing what is the name of a non-self-replicating type of malware program containing malicious code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it, when executed, carries out actions that are unknown to the person installing it, typically causing loss or theft of data, and possible system harm.

A.

virus

B.

worm

C.

Trojan horse.

D.

trapdoor

Question # 134

What do the ILOVEYOU and Melissa virus attacks have in common?

A.

They are both denial-of-service (DOS) attacks.

B.

They have nothing in common.

C.

They are both masquerading attacks.

D.

They are both social engineering attacks.

Question # 135

A deviation from an organization-wide security policy requires which of the following?

A.

Risk Acceptance

B.

Risk Assignment

C.

Risk Reduction

D.

Risk Containment

Question # 136

Organizations should not view disaster recovery as which of the following?

A.

Committed expense.

B.

Discretionary expense.

C.

Enforcement of legal statutes.

D.

Compliance with regulations.

Question # 137

To protect and/or restore lost, corrupted, or deleted information, thereby preserving the data integrity and availability is the purpose of:

A.

Remote journaling.

B.

Database shadowing.

C.

A tape backup method.

D.

Mirroring.

Question # 138

Which element must computer evidence have to be admissible in court?

A.

It must be relevant.

B.

It must be annotated.

C.

It must be printed.

D.

It must contain source code.

Question # 139

Which of the following is NOT a part of a risk analysis?

A.

Identify risks

B.

Quantify the impact of potential threats

C.

Provide an economic balance between the impact of the risk and the cost of the associated countermeasure

D.

Choose the best countermeasure

Question # 140

In an online transaction processing system (OLTP), which of the following actions should be taken when erroneous or invalid transactions are detected?

A.

The transactions should be dropped from processing.

B.

The transactions should be processed after the program makes adjustments.

C.

The transactions should be written to a report and reviewed.

D.

The transactions should be corrected and reprocessed.

Go to page: