Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC SSCP - Systems Security Certified Practitioner

Page: 10 / 14
Total 1074 questions

Which of the following is the primary security feature of a proxy server?

A.

Virus Detection

B.

URL blocking

C.

Route blocking

D.

Content filtering

A packet containing a long string of NOP's followed by a command is usually indicative of what?

A.

A syn scan.

B.

A half-port scan.

C.

A buffer overflow attack.

D.

A packet destined for the network's broadcast address.

Which of the following transmission media would NOT be affected by cross talk or interference?

A.

Copper cable

B.

Radio System

C.

Satellite radiolink

D.

Fiber optic cables

Within the OSI model, at what layer are some of the SLIP, CSLIP, PPP control functions provided?

A.

Data Link

B.

Transport

C.

Presentation

D.

Application

Which of the following is NOT a basic component of security architecture?

A.

Motherboard

B.

Central Processing Unit (CPU

C.

Storage Devices

D.

Peripherals (input/output devices)

What is defined as the hardware, firmware and software elements of a trusted computing base that implement the reference monitor concept?

A.

The reference monitor

B.

Protection rings

C.

A security kernel

D.

A protection domain

Which of the following is most concerned with personnel security?

A.

Management controls

B.

Operational controls

C.

Technical controls

D.

Human resources controls

When it comes to magnetic media sanitization, what difference can be made between clearing and purging information?

A.

Clearing completely erases the media whereas purging only removes file headers, allowing the recovery of files.

B.

Clearing renders information unrecoverable by a keyboard attack and purging renders information unrecoverable against laboratory attack.

C.

They both involve rewriting the media.

D.

Clearing renders information unrecoverable against a laboratory attack and purging renders information unrecoverable to a keyboard attack.

Which of the following is responsible for MOST of the security issues?

A.

Outside espionage

B.

Hackers

C.

Personnel

D.

Equipment failure

Which of the following are required for Life-Cycle Assurance?

A.

System Architecture and Design specification.

B.

Security Testing and Covert Channel Analysis.

C.

Security Testing and Trusted distribution.

D.

Configuration Management and Trusted Facility Management.

Which of the following statements pertaining to software testing approaches is correct?

A.

A bottom-up approach allows interface errors to be detected earlier.

B.

A top-down approach allows errors in critical modules to be detected earlier.

C.

The test plan and results should be retained as part of the system's permanent documentation.

D.

Black box testing is predicated on a close examination of procedural detail.

Which of the following exemplifies proper separation of duties?

A.

Operators are not permitted modify the system time.

B.

Programmers are permitted to use the system console.

C.

Console operators are permitted to mount tapes and disks.

D.

Tape operators are permitted to use the system console.

Which of the following phases of a software development life cycle normally incorporates the security specifications, determines access controls, and evaluates encryption options?

A.

Detailed design

B.

Implementation

C.

Product design

D.

Software plans and requirements

Which of the following is less likely to be included in the change control sub-phase of the maintenance phase of a software product?

A.

Estimating the cost of the changes requested

B.

Recreating and analyzing the problem

C.

Determining the interface that is presented to the user

D.

Establishing the priorities of requests

The information security staff's participation in which of the following system development life cycle phases provides maximum benefit to the organization?

A.

project initiation and planning phase

B.

system design specifications phase

C.

development and documentation phase

D.

in parallel with every phase throughout the project

Which of the following is considered the weakest link in a security system?

A.

People

B.

Software

C.

Communications

D.

Hardware

Related to information security, integrity is the opposite of which of the following?

A.

abstraction

B.

alteration

C.

accreditation

D.

application

Which of the following is not a responsibility of an information (data) owner?

A.

Determine what level of classification the information requires.

B.

Periodically review the classification assignments against business needs.

C.

Delegate the responsibility of data protection to data custodians.

D.

Running regular backups and periodically testing the validity of the backup data.

Making sure that the data is accessible when and where it is needed is which of the following?

A.

confidentiality

B.

integrity

C.

acceptability

D.

availability

The security of a computer application is most effective and economical in which of the following cases?

A.

The system is optimized prior to the addition of security.

B.

The system is procured off-the-shelf.

C.

The system is customized to meet the specific security threat.

D.

The system is originally designed to provide the necessary security.