Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ISC SSCP - Systems Security Certified Practitioner

Page: 11 / 14
Total 1074 questions

Which of the following test makes sure the modified or new system includes appropriate access controls and does not introduce any security holes that might compromise other systems?

A.

Recovery testing

B.

Security testing

C.

Stress/volume testing

D.

Interface testing

Which of the following is NOT a common integrity goal?

A.

Prevent unauthorized users from making modifications.

B.

Maintain internal and external consistency.

C.

Prevent authorized users from making improper modifications.

D.

Prevent paths that could lead to inappropriate disclosure.

Configuration Management controls what?

A.

Auditing of changes to the Trusted Computing Base.

B.

Control of changes to the Trusted Computing Base.

C.

Changes in the configuration access to the Trusted Computing Base.

D.

Auditing and controlling any changes to the Trusted Computing Base.

Which of the following choices describe a condition when RAM and Secondary storage are used together?

A.

Primary storage

B.

Secondary storage

C.

Virtual storage

D.

Real storage

Which of the following embodies all the detailed actions that personnel are required to follow?

A.

Standards

B.

Guidelines

C.

Procedures

D.

Baselines

Which of the following best corresponds to the type of memory addressing where the address location that is specified in the program instruction contains the address of the final desired location?

A.

Direct addressing

B.

Indirect addressing

C.

Indexed addressing

D.

Program addressing

Which of the following phases of a software development life cycle normally addresses Due Care and Due Diligence?

A.

Implementation

B.

System feasibility

C.

Product design

D.

Software plans and requirements

A 'Pseudo flaw' is which of the following?

A.

An apparent loophole deliberately implanted in an operating system program as a trap for intruders.

B.

An omission when generating Psuedo-code.

C.

Used for testing for bounds violations in application programming.

D.

A normally generated page fault causing the system to halt.

What security problem is most likely to exist if an operating system permits objects to be used sequentially by multiple users without forcing a refresh of the objects?

A.

Disclosure of residual data.

B.

Unauthorized obtaining of a privileged execution state.

C.

Denial of service through a deadly embrace.

D.

Data leakage through covert channels.

What is the main purpose of Corporate Security Policy?

A.

To transfer the responsibility for the information security to all users of the organization

B.

To communicate management's intentions in regards to information security

C.

To provide detailed steps for performing specific actions

D.

To provide a common framework for all development activities

The control of communications test equipment should be clearly addressed by security policy for which of the following reasons?

A.

Test equipment is easily damaged.

B.

Test equipment can be used to browse information passing on a network.

C.

Test equipment is difficult to replace if lost or stolen.

D.

Test equipment must always be available for the maintenance personnel.

What can best be defined as high-level statements, beliefs, goals and objectives?

A.

Standards

B.

Policies

C.

Guidelines

D.

Procedures

Which of the following are the steps usually followed in the development of documents such as security policy, standards and procedures?

A.

design, development, publication, coding, and testing.

B.

design, evaluation, approval, publication, and implementation.

C.

initiation, evaluation, development, approval, publication, implementation, and maintenance.

D.

feasibility, development, approval, implementation, and integration.

Which of the following is not a component of a Operations Security "triples"?

A.

Asset

B.

Threat

C.

Vulnerability

D.

Risk

When attempting to establish Liability, which of the following would be describe as performing the ongoing maintenance necessary to keep something in proper working order, updated, effective, or to abide by what is commonly expected in a situation?

A.

Due care

B.

Due concern

C.

Due diligence

D.

Due practice

Which of the following is commonly used for retrofitting multilevel security to a database management system?

A.

trusted front-end.

B.

trusted back-end.

C.

controller.

D.

kernel.

Who is responsible for initiating corrective measures and capabilities used when there are security violations?

A.

Information systems auditor

B.

Security administrator

C.

Management

D.

Data owners

Who of the following is responsible for ensuring that proper controls are in place to address integrity, confidentiality, and availability of IT systems and data?

A.

Business and functional managers

B.

IT Security practitioners

C.

System and information owners

D.

Chief information officer

Which of the following is based on the premise that the quality of a software product is a direct function of the quality of its associated software development and maintenance processes?

A.

The Software Capability Maturity Model (CMM)

B.

The Spiral Model

C.

The Waterfall Model

D.

Expert Systems Model

What is called a system that is capable of detecting that a fault has occurred and has the ability to correct the fault or operate around it?

A.

A fail safe system

B.

A fail soft system

C.

A fault-tolerant system

D.

A failover system