SSCP Which of the following backup methods is primarily run when time and tape space permits, and is used for the system archive or baselined tape sets?
#121
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following outlined how senior management are responsible for the computer and information security decisions that they make and what actually took place within their organizations?
#122
Answer: B✅ Correct❌ Incorrect
SSCP An Intrusion Detection System (IDS) is what type of control?
#123
Answer: B✅ Correct❌ Incorrect
SSCP To protect and/or restore lost, corrupted, or deleted information, thereby preserving the data integrity and availability is the purpose of:
#124
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following is an example of an active attack?
#125
Answer: B✅ Correct❌ Incorrect
SSCP A copy of evidence or oral description of its contents; which is not as reliable as best evidence is what type of evidence?
#126
Answer: C✅ Correct❌ Incorrect
SSCP In the statement below, fill in the blank:Law enforcement agencies must get a warrant to search and seize an individual's property, as stated in the _____ Amendment.
#127
Answer: D✅ Correct❌ Incorrect
SSCP Computer security should be first and foremost which of the following:
#128
Answer: B✅ Correct❌ Incorrect
SSCP Why would a memory dump be admissible as evidence in court?
#129
Answer: B✅ Correct❌ Incorrect
SSCP Which type of attack would a competitive intelligence attack best classify as?
#130
Answer: A✅ Correct❌ Incorrect
SSCP When a possible intrusion into your organization's information system has been detected, which of the following actions should be performed first?
#131
Answer: C✅ Correct❌ Incorrect
SSCP When first analyzing an intrusion that has just been detected and confirming that it is a true positive, which of the following actions should be done as a first step if you wish to prosecute the attacker in court?
#132
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following statements do not apply to a hot site?
#133
Answer: C✅ Correct❌ Incorrect
SSCP Where parties do not have a shared secret and large quantities of sensitive information must be passed, the most efficient means of transferring information is to use Hybrid Encryption Methods. What does this mean?
#134
Answer: A✅ Correct❌ Incorrect
SSCP Brute force attacks against encryption keys have increased in potency because of increased computing power. Which of the following is often considered a good protection against the brute force cryptography attack?
#135
Answer: B✅ Correct❌ Incorrect
SSCP What is the role of IKE within the IPsec protocol?
#136
Answer: A✅ Correct❌ Incorrect
SSCP In which phase of Internet Key Exchange (IKE) protocol is peer authentication performed?
#137
Answer: B✅ Correct❌ Incorrect
SSCP In a hierarchical PKI the highest CA is regularly called Root CA, it is also referred to by which one of the following term?
#138
Answer: B✅ Correct❌ Incorrect
SSCP A X.509 public key certificate with the key usage attribute "non repudiation" can be used for which of the following?
#139
Answer: C✅ Correct❌ Incorrect
SSCP Which of the following can best define the "revocation request grace period"?
#140
Answer: D✅ Correct❌ Incorrect
SSCP Which of the following ASYMMETRIC encryption algorithms is based on the difficulty of FACTORING LARGE NUMBERS?
#141
Answer: C✅ Correct❌ Incorrect
SSCP What can be defined as an instance of two different keys generating the same ciphertext from the same plaintext?
#142
Answer: B✅ Correct❌ Incorrect
SSCP Which of the following algorithms is used today for encryption in PGP?
#143
Answer: B✅ Correct❌ Incorrect
SSCP Which of the following offers security to wireless communications?
#144
Answer: B✅ Correct❌ Incorrect
SSCP Cryptography does not concern itself with which of the following choices?
#145
Answer: A✅ Correct❌ Incorrect
SSCP In the days before CIDR (Classless Internet Domain Routing), networks were commonly organized by classes. Which of the following would have been true of aClass B network?
#146
Answer: C✅ Correct❌ Incorrect
SSCP Which one of the following is usually not a benefit resulting from the use of firewalls?
#147
Answer: B✅ Correct❌ Incorrect
SSCP Within the OSI model, at what layer are some of the SLIP, CSLIP, PPP control functions provided?
#148
Answer: A✅ Correct❌ Incorrect
SSCP Which of the following is unlike the other three choices presented?
#149
Answer: A✅ Correct❌ Incorrect
SSCP In which layer of the OSI Model are connection-oriented protocols located in the TCP/IP suite of protocols?