SSCP Which of the following is responsible for MOST of the security issues?
#91
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following choices describe a condition when RAM and Secondary storage are used together?
#92
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following statements pertaining to protection rings is false?
#93
Answer: D✅ Correct❌ Incorrect
SSCP Which of the following is not a component of a Operations Security "triples"?
#94
Answer: D✅ Correct❌ Incorrect
SSCP Who is responsible for implementing user clearances in computer-based information systems at the B3 level of the TCSEC rating ?
#95
Answer: A✅ Correct❌ Incorrect
SSCP Who is responsible for initiating corrective measures and capabilities used when there are security violations?
#96
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following security modes of operation involves the highest risk?
#97
Answer: B✅ Correct❌ Incorrect
SSCP What can best be defined as the detailed examination and testing of the security features of an IT system or product to ensure that they work correctly and effectively and do not show any logical vulnerabilities, such as evaluation criteria?
#98
Answer: B✅ Correct❌ Incorrect
SSCP Which of the following should NOT be performed by an operator?
#99
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following statements pertaining to software testing approaches is correct?
#100
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following phases of a software development life cycle normally incorporates the security specifications, determines access controls, and evaluates encryption options?
#101
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following is less likely to be included in the change control sub-phase of the maintenance phase of a software product?
#102
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following rules is least likely to support the concept of least privilege?
#103
Answer: D✅ Correct❌ Incorrect
SSCP Which of the following best defines add-on security?
#104
Answer: D✅ Correct❌ Incorrect
SSCP Whose role is it to assign classification level to information?
#105
Answer: C✅ Correct❌ Incorrect
SSCP In what way could Java applets pose a security threat?
#106
Answer: C✅ Correct❌ Incorrect
SSCP Attributable data should be:
#107
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following usually provides reliable, real-time information without consuming network or host resources?
#108
Answer: A✅ Correct❌ Incorrect
SSCP The fact that a network-based IDS reviews packets payload and headers enable which of the following?
#109
Answer: A✅ Correct❌ Incorrect
SSCP Attributes that characterize an attack are stored for reference using which of the following Intrusion Detection System (IDS) ?
#110
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following is NOT a fundamental component of an alarm in an intrusion detection system?
#111
Answer: D✅ Correct❌ Incorrect
SSCP Which one of the following statements about the advantages and disadvantages of network-based Intrusion detection systems is true
#112
Answer: D✅ Correct❌ Incorrect
SSCP The session layer provides a logical persistent connection between peer hosts. Which of the following is one of the modes used in the session layer to establish this connection?
#113
Answer: A✅ Correct❌ Incorrect
SSCP What is the primary goal of setting up a honeypot?
#114
Answer: D✅ Correct❌ Incorrect
SSCP Which conceptual approach to intrusion detection system is the most common?
#115
Answer: B✅ Correct❌ Incorrect
SSCP In order to enable users to perform tasks and duties without having to go through extra steps it is important that the security controls and mechanisms that are in place have a degree of?
#116
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following recovery plan test results would be most useful to management?
#117
Answer: A✅ Correct❌ Incorrect
SSCP Within the realm of IT security, which of the following combinations best defines risk?
#118
Answer: B✅ Correct❌ Incorrect
SSCP Which of the following is NOT a transaction redundancy implementation?
#119
Answer: B✅ Correct❌ Incorrect
SSCP Another example of Computer Incident Response Team (CIRT) activities is: