Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 17 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 161

Which of the following describes a technique in which a number of processor units are employed in a single computer system to increase the performance of the system in its application environment above the performance of a single processor of the same kind?

A.

Multitasking

B.

Multiprogramming

C.

Pipelining

D.

Multiprocessing

Question # 162

Making sure that only those who are supposed to access the data can access is which of the following?

A.

confidentiality.

B.

capability.

C.

integrity.

D.

availability.

Question # 163

Which of the following does not address Database Management Systems (DBMS) Security?

A.

Perturbation

B.

Cell suppression

C.

Padded cells

D.

Partitioning

Question # 164

Which of the following exemplifies proper separation of duties?

A.

Operators are not permitted modify the system time.

B.

Programmers are permitted to use the system console.

C.

Console operators are permitted to mount tapes and disks.

D.

Tape operators are permitted to use the system console.

Question # 165

Which of the following test makes sure the modified or new system includes appropriate access controls and does not introduce any security holes that might compromise other systems?

A.

Recovery testing

B.

Security testing

C.

Stress/volume testing

D.

Interface testing

Question # 166

Which of the following best corresponds to the type of memory addressing where the address location that is specified in the program instruction contains the address of the final desired location?

A.

Direct addressing

B.

Indirect addressing

C.

Indexed addressing

D.

Program addressing

Question # 167

What setup should an administrator use for regularly testing the strength of user passwords?

A.

A networked workstation so that the live password database can easily be accessed by the cracking program.

B.

A networked workstation so the password database can easily be copied locally and processed by the cracking program.

C.

A standalone workstation on which the password database is copied and processed by the cracking program.

D.

A password-cracking program is unethical; therefore it should not be used.

Question # 168

Who is responsible for providing reports to the senior management on the effectiveness of the security controls?

A.

Information systems security professionals

B.

Data owners

C.

Data custodians

D.

Information systems auditors

Question # 169

Which security model uses division of operations into different parts and requires different users to perform each part?

A.

Bell-LaPadula model

B.

Biba model

C.

Clark-Wilson model

D.

Non-interference model

Question # 170

Which of the following does not apply to system-generated passwords?

A.

Passwords are harder to remember for users.

B.

If the password-generating algorithm gets to be known, the entire system is in jeopardy.

C.

Passwords are more vulnerable to brute force and dictionary attacks.

D.

Passwords are harder to guess for attackers.

Question # 171

Almost all types of detection permit a system ' s sensitivity to be increased or decreased during an inspection process. If the system ' s sensitivity is increased, such as in a biometric authentication system, the system becomes increasingly selective and has the possibility of generating:

A.

Lower False Rejection Rate (FRR)

B.

Higher False Rejection Rate (FRR)

C.

Higher False Acceptance Rate (FAR)

D.

It will not affect either FAR or FRR

Question # 172

Which of the following is needed for System Accountability?

A.

Audit mechanisms.

B.

Documented design as laid out in the Common Criteria.

C.

Authorization.

D.

Formal verification of system design.

Question # 173

Which of the following is NOT a form of detective administrative control?

A.

Rotation of duties

B.

Required vacations

C.

Separation of duties

D.

Security reviews and audits

Question # 174

What does the simple security (ss) property mean in the Bell-LaPadula model?

A.

No read up

B.

No write down

C.

No read down

D.

No write up

Question # 175

How would nonrepudiation be best classified as?

A.

A preventive control

B.

A logical control

C.

A corrective control

D.

A compensating control

Question # 176

What would be the name of a Logical or Virtual Table dynamically generated to restrict the information a user can access in a database?

A.

Database Management system

B.

Database views

C.

Database security

D.

Database shadowing

Question # 177

What is called the percentage of valid subjects that are falsely rejected by a Biometric Authentication system?

A.

False Rejection Rate (FRR) or Type I Error

B.

False Acceptance Rate (FAR) or Type II Error

C.

Crossover Error Rate (CER)

D.

True Rejection Rate (TRR) or Type III Error

Question # 178

Which of the following is most appropriate to notify an external user that session monitoring is being conducted?

A.

Logon Banners

B.

Wall poster

C.

Employee Handbook

D.

Written agreement

Question # 179

Which of the following division is defined in the TCSEC (Orange Book) as minimal protection?

A.

Division D

B.

Division C

C.

Division B

D.

Division A

Question # 180

Which of the following is not a preventive login control?

A.

Last login message

B.

Password aging

C.

Minimum password length

D.

Account expiration

Go to page: