Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 17 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 141

What ensures that the control mechanisms correctly implement the security policy for the entire life cycle of an information system?

A.

Accountability controls

B.

Mandatory access controls

C.

Assurance procedures

D.

Administrative controls

Question # 142

The fact that a network-based IDS reviews packets payload and headers enable which of the following?

A.

Detection of denial of service

B.

Detection of all viruses

C.

Detection of data corruption

D.

Detection of all password guessing attacks

Question # 143

If an organization were to monitor their employees ' e-mail, it should not:

A.

Monitor only a limited number of employees.

B.

Inform all employees that e-mail is being monitored.

C.

Explain who can read the e-mail and how long it is backed up.

D.

Explain what is considered an acceptable use of the e-mail system.

Question # 144

Which of the following is most likely to be useful in detecting intrusions?

A.

Access control lists

B.

Security labels

C.

Audit trails

D.

Information security policies

Question # 145

What is a limitation of TCP Wrappers?

A.

It cannot control access to running UDP services.

B.

It stops packets before they reach the application layer, thus confusing some proxy servers.

C.

The hosts. access control system requires a complicated directory tree.

D.

They are too expensive.

Question # 146

Which of the following algorithms does NOT provide hashing?

A.

SHA-1

B.

MD2

C.

RC4

D.

MD5

Question # 147

What is NOT true with pre shared key authentication within IKE / IPsec protocol?

A.

Pre shared key authentication is normally based on simple passwords

B.

Needs a Public Key Infrastructure (PKI) to work

C.

IKE is used to setup Security Associations

D.

IKE builds upon the Oakley protocol and the ISAKMP protocol.

Question # 148

Which of the following questions is less likely to help in assessing physical and environmental protection?

A.

Are entry codes changed periodically?

B.

Are appropriate fire suppression and prevention devices installed and working?

C.

Are there processes to ensure that unauthorized individuals cannot read, copy, alter, or steal printed or electronic information?

D.

Is physical access to data transmission lines controlled?

Question # 149

Which of the following is best defined as a mode of system termination that automatically leaves system processes and components in a secure state when a failure occurs or is detected in a system?

A.

Fail proof

B.

Fail soft

C.

Fail safe

D.

Fail Over

Question # 150

What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?

A.

Data fiddling

B.

Data diddling

C.

Salami techniques

D.

Trojan horses

Question # 151

The high availability of multiple all-inclusive, easy-to-use hacking tools that do NOT require much technical knowledge has brought a growth in the number of which type of attackers?

A.

Black hats

B.

White hats

C.

Script kiddies

D.

Phreakers

Question # 152

Virus scanning and content inspection of SMIME encrypted e-mail without doing any further processing is:

A.

Not possible

B.

Only possible with key recovery scheme of all user keys

C.

It is possible only if X509 Version 3 certificates are used

D.

It is possible only by " brute force " decryption

Question # 153

Which virus category has the capability of changing its own code, making it harder to detect by anti-virus software?

A.

Stealth viruses

B.

Polymorphic viruses

C.

Trojan horses

D.

Logic bombs

Question # 154

Which of the following teams should NOT be included in an organization ' s contingency plan?

A.

Damage assessment team

B.

Hardware salvage team

C.

Tiger team

D.

Legal affairs team

Question # 155

The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system is referred to as?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Reliability

Question # 156

Which of the following BEST explains why computerized information systems frequently fail to meet the needs of users?

A.

Inadequate quality assurance (QA) tools.

B.

Constantly changing user needs.

C.

Inadequate user participation in defining the system ' s requirements.

D.

Inadequate project management.

Question # 157

What can be described as an imaginary line that separates the trusted components of the TCB from those elements that are NOT trusted?

A.

The security kernel

B.

The reference monitor

C.

The security perimeter

D.

The reference perimeter

Question # 158

Which of the following is often the greatest challenge of distributed computing solutions?

A.

scalability

B.

security

C.

heterogeneity

D.

usability

Question # 159

Which of the following is an advantage in using a bottom-up versus a top-down approach to software testing?

A.

Interface errors are detected earlier.

B.

Errors in critical modules are detected earlier.

C.

Confidence in the system is achieved earlier.

D.

Major functions and processing are tested earlier.

Question # 160

Which of the following rules is least likely to support the concept of least privilege?

A.

The number of administrative accounts should be kept to a minimum.

B.

Administrators should use regular accounts when performing routine operations like reading mail.

C.

Permissions on tools that are likely to be used by hackers should be as restrictive as possible.

D.

Only data to and from critical systems and applications should be allowed through the firewall.

Go to page: