Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 16 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 16 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 4

Which of the following backup methods is most appropriate for off-site archiving?

A.

Incremental backup method

B.

Off-site backup method

C.

Full backup method

D.

Differential backup method

Question # 5

Which of the following statements pertaining to a Criticality Survey is incorrect?

A.

It is implemented to gather input from all personnel that is going to be part of the recovery teams.

B.

The purpose of the survey must be clearly stated.

C.

Management ' s approval should be obtained before distributing the survey.

D.

Its intent is to find out what services and systems are critical to keeping the organization in business.

Question # 6

Which type of attack involves impersonating a user or a system?

A.

Smurfing attack

B.

Spoofing attack

C.

Spamming attack

D.

Sniffing attack

Question # 7

Who is responsible for initiating corrective measures and capabilities used when there are security violations?

A.

Information systems auditor

B.

Security administrator

C.

Management

D.

Data owners

Question # 8

Which of the following would best describe a Concealment cipher?

A.

Permutation is used, meaning that letters are scrambled.

B.

Every X number of words within a text, is a part of the real message.

C.

Replaces bits, characters, or blocks of characters with different bits, characters or blocks.

D.

Hiding data in another message so that the very existence of the data is concealed.

Question # 9

Which of the following packets should NOT be dropped at a firewall protecting an organization ' s internal network?

A.

Inbound packets with Source Routing option set

B.

Router information exchange protocols

C.

Inbound packets with an internal address as the source IP address

D.

Outbound packets with an external destination IP address

Question # 10

Which backup method only copies files that have been recently added or changed and also leaves the archive bit unchanged?

A.

Full backup method

B.

Incremental backup method

C.

Fast backup method

D.

Differential backup method

Question # 11

What can be defined as a batch process dumping backup data through communications lines to a server at an alternate location?

A.

Remote journaling

B.

Electronic vaulting

C.

Data clustering

D.

Database shadowing

Question # 12

What uses a key of the same length as the message where each bit or character from the plaintext is encrypted by a modular addition?

A.

Running key cipher

B.

One-time pad

C.

Steganography

D.

Cipher block chaining

Question # 13

Which of the following IEEE standards defines the token ring media access method?

A.

802.3

B.

802.11

C.

802.5

D.

802.2

Question # 14

To be admissible in court, computer evidence must be which of the following?

A.

Relevant

B.

Decrypted

C.

Edited

D.

Incriminating

Question # 15

Qualitative loss resulting from the business interruption does NOT usually include:

A.

Loss of revenue

B.

Loss of competitive advantage or market share

C.

Loss of public confidence and credibility

D.

Loss of market leadership

Question # 16

A business continuity plan should list and prioritize the services that need to be brought back after a disaster strikes. Which of the following services is more likely to be of primary concern in the context of what your Disaster Recovery Plan would include?

A.

Marketing/Public relations

B.

Data/Telecomm/IS facilities

C.

IS Operations

D.

Facilities security

Question # 17

Which of the following backup methods is primarily run when time and tape space permits, and is used for the system archive or baselined tape sets?

A.

full backup method.

B.

incremental backup method.

C.

differential backup method.

D.

tape backup method.

Question # 18

In the UTP category rating, the tighter the wind:

A.

the higher the rating and its resistance against interference and crosstalk.

B.

the slower the rating and its resistance against interference and attenuation.

C.

the shorter the rating and its resistance against interference and attenuation.

D.

the longer the rating and its resistance against interference and attenuation.

Question # 19

Application Layer Firewalls operate at the:

A.

OSI protocol Layer seven, the Application Layer.

B.

OSI protocol Layer six, the Presentation Layer.

C.

OSI protocol Layer five, the Session Layer.

D.

OSI protocol Layer four, the Transport Layer.

Question # 20

Secure Shell (SSH-2) supports authentication, compression, confidentiality, and integrity, SSH is commonly used as a secure alternative to all of the following protocols below except:

A.

telnet

B.

rlogin

C.

RSH

D.

HTTPS

Go to page: