Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

Systems Security
Certified Practitioner
Version: Demo
[ Total Questions: 10]
Web: www.certsout.com
Email: support@certsout.com
ISC
SSCP
https://www.certsout.com
https://www.certsout.com/SSCP-test.html
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any
suggestions, please feel free to contact us at feedback@certsout.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at and our technical experts will provide support within 24 hours.support@certsout.com
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
ISC - SSCPCerts Exam
1 of 14Pass with Valid Exam Questions Pool
Exam Topic Breakdown
Exam Topic Number of Questions
Topic 4 : Risk, Response and Recovery 2
Topic 7 : Malicious Code 2
Topic 1 : Access Control 2
Topic 2 : Security Operation Adimnistration 2
Topic 6 : Network and Telecommunications 2
Topic 5 : Cryptography 0
Topic 3 : Analysis and Monitoring 0
TOTAL 10
ISC - SSCPCerts Exam
2 of 14Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
Topic 4, Risk, Response and Recovery
Question #:1 - (Exam Topic 4)
Which of the following best describes what would be expected at a "hot site"?
Computers, climate control, cables and peripherals
Computers and peripherals
Computers and dedicated climate control systems.
Dedicated climate control systems
Answer: A
Explanation
A Hot Site contains everything needed to become operational in the shortest amount of time.
The following answers are incorrect:
Computers and peripherals. Is incorrect because no mention is made of cables. You would not be fully
operational without those.
Computers and dedicated climate control systems. Is incorrect because no mention is made of peripherals. You
would not be fully operational without those.
Dedicated climate control systems. Is incorrect because no mentionis made of computers, cables and
peripherals. You would not be fully operational without those.
According to the OIG, a hot site is defined as a fully configured site with complete customer required
hardware and software provided by the service provider. A hot site in the context of the CBK is always a
RENTAL place. If you have your own site fully equipped that you make use of in case of disaster that would
be called a redundant site or an alternate site.
Wikipedia: "A hot site is a duplicate of the original site of the organization, with full computer systems as well
as near-complete backups of user data."
References:
OIG CBK, Business Continuity and Disaster Recovery Planning (pages 367 - 368)
AIO, 3rd Edition, Business Continuity Planning (pages 709 - 714)
AIO, 4th Edition, Business Continuity Planning , p 790.
ISC - SSCPCerts Exam
3 of 14Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
Wikipedia
- http://en.wikipedia.org/wiki/Hot_site#Hot_Sites
Question #:2 - (Exam Topic 4)
Within the legal domain what rule is concerned with the legality of how the evidence was gathered ?
Exclusionary rule
Best evidence rule
Hearsay rule
Investigation rule
Answer: A
Explanation
The exclusionary rule mentions that evidence must be gathered legally or it can't be used.
The principle based on federal Constitutional Law that evidence illegally seized by law enforcement officers in
violation of a suspect's right to be free from unreasonable searches and seizures cannot be used against the
suspect in a criminal prosecution.
The exclusionary rule is designed to exclude evidence obtained in violation of a criminal defendant's Fourth
Amendment rights. The Fourth Amendment protects against unreasonable searches and seizures by law
enforcement personnel. If the search of a criminal suspect is unreasonable, the evidence obtained in the search
will be excluded from trial.
The exclusionary rule is a court-made rule. This means that it was created not in statutes passed by legislative
bodies but rather by the U.S. Supreme Court. The exclusionary rule applies in federal courts by virtue of the
Fourth Amendment. The Court has ruled that it applies in state courts although the due process clause of the
Fourteenth Amendment.(The Bill of Rights—the first ten amendments— applies to actions by the federal
government. The Fourteenth Amendment, the Court has held, makes most of the protections in the Bill of
Rights applicable to actions by the states.)
The exclusionary rule has been in existence since the early 1900s. Before the rule was fashioned, any evidence
was admissible in a criminal trial if the judge found the evidence to be relevant. The manner in which the
evidence had been seized was not an issue. This began to change in 1914, when the U.S. Supreme Court
devised a way to enforce the Fourth Amendment. In Weeks v. United States, 232 U.S. 383, 34 S. Ct. 341, 58
L. Ed. 652 (1914), a federal agent had conducted a warrantless search for evidence of gambling at the home of
Fremont Weeks. The evidence seized in the search was used at trial, and Weeks was convicted. On appeal, the
Court held that the Fourth Amendment barred the use of evidence secured through a warrantless search.
Weeks's conviction was reversed, and thus was born the exclusionary rule.
The best evidence rule concerns limiting potential for alteration. The best evidence rule is a common law rule
of evidence which can be traced back at least as far as the 18th century. In Omychund v Barker (1745) 1 Atk,
21, 49; 26 ER 15, 33, Lord Harwicke stated that no evidence was admissible unless it was "the best that the
ISC - SSCPCerts Exam
4 of 14Pass with Valid Exam Questions Pool
nature of the case will allow". The general rule is that secondary evidence, such as a copy or facsimile, will be
not admissible if an original document exists, and is not unavailable due to destruction or other circumstances
indicating unavailability.
The rationale for the best evidence rule can be understood from the context in which it arose: in the eighteenth
century a copy was usually made by hand by a clerk (or even a litigant). The best evidence rule was predicated
on the assumption that, if the original was not produced, there was a significant chance of error or fraud in
relying on such a copy.
The hearsay rule concerns computer-generated evidence, which is considered second-hand evidence.
Hearsay is information gathered by one person from another concerning some event, condition, or thing of
which the first person had no direct experience. When submitted as evidence, such statements are called
hearsay evidence. As a legal term, "hearsay" can also have the narrower meaning of the use of such
information as evidence to prove the truth of what is asserted. Such use of "hearsay evidence" in court is
generally not allowed. This prohibition is called the hearsay rule.
For example, a witness says "Susan told me Tom was in town". Since the witness did not see Tom in town, the
statement would be hearsay evidence to the fact that Tom was in town, and not admissible. However, it would
be admissible as evidence that Susan said Tom was in town, and on the issue of her knowledge of whether he
was in town.
Hearsay evidence has many exception rules. For the purpose of the exam you must be familiar with the
business records exception rule to the Hearsay Evidence. The business records created during the ordinary
course of business are considered reliable and can usually be brought in under this exception if the proper
foundation is laid when the records are introduced into evidence. Depending on which jurisdiction the case is
in, either the records custodian or someone with knowledge of the records must lay a foundation for the
records. Logs that are collected as part of a document business process being carried at regularinterval would
fall under this exception. They could be presented in court and not be considered Hearsay.
Investigation rule is a detractor.
Source: ROTHKE, Ben, CISSP CBK Review presentation on domain 9.
and
The FREE Online Law Dictionary at: http://legal-dictionary.thefreedictionary.com/Exclusionary+Rule
and
Wikipedia has a nice article on this subject at: http://en.wikipedia.org/wiki/Exclusionary_rule
and
http://en.wikipedia.org/wiki/Hearsay_in_United_States_law#Hearsay_exceptions
http://legal-dictionary.thefreedictionary.com/Exclusionary+Rule
http://en.wikipedia.org/wiki/Exclusionary_rule
http://en.wikipedia.org/wiki/Hearsay_in_United_States_law#Hearsay_exceptions
ISC - SSCPCerts Exam
5 of 14Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
Topic 7, Malicious Code
Question #:3 - (Exam Topic 7)
In computing what is the name of a non-self-replicating type of malware program containing malicious code
that appears to have some useful purpose but also contains code that has a malicious or harmful purpose
imbedded in it, when executed, carries out actions that are unknown to the person installing it, typically
causing loss or theft of data, and possible system harm.
virus
worm
Trojan horse.
trapdoor
Answer: C
Explanation
A trojan horse is any code that appears to have some useful purpose but also contains code that has a malicious
or harmful purpose imbedded in it. A Trojan often also includes a trapdoor as a means to gain access to a
computer system bypassing security controls.
Wikipedia defines it as:
A Trojan horse, or Trojan, in computing is a non-self-replicating type of malware program containing
malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically
causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse
used to trick defenders of Troy into taking concealed warriors into their city in ancient Greece, because
computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or
interesting in order to persuade victims to install them on their computers.
The following answers are incorrect:
virus. Is incorrect because a Virus is a malicious program and is does not appear to be harmless, it's sole
purpose is malicious intent often doing damage to a system. A computer virus is a type of malware that, when
executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files,
or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be
"infected".
worm. Is incorrect because a Worm is similiar to a Virus but does not require user intervention to execute.
Rather than doing damage to the system, worms tend to self-propagate and devour the resources of a system.
A computer worm is a standalone malware computer program that replicates itself in order to spread to other
computers. Often, it uses a computer network to spread itself, relying on security failures on the target
computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms
almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses
almost always corrupt or modify files on a targeted computer.
ISC - SSCPCerts Exam
6 of 14Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
trapdoor. Is incorrect because a trapdoor is a means to bypass security by hiding an entry point into a system.
Trojan Horses often have a trapdoor imbedded in them.
References:
http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29
and
http://en.wikipedia.org/wiki/Computer_virus
and
http://en.wikipedia.org/wiki/Computer_worm
and
http://en.wikipedia.org/wiki/Backdoor_%28computing%29
Question #:4 - (Exam Topic 7)
What best describes a scenario when an employee has been shaving off pennies from multiple accounts and
depositing the funds into his own bank account?
Data fiddling
Data diddling
Salami techniques
Trojan horses
Answer: C
Explanation
Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2001, Page
644.
http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29
http://en.wikipedia.org/wiki/Computer_virus
http://en.wikipedia.org/wiki/Computer_worm
http://en.wikipedia.org/wiki/Backdoor_%28computing%29
ISC - SSCPCerts Exam
7 of 14Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
Topic 1, Access Control
Question #:5 - (Exam Topic 1)
Passwords can be required to change monthly, quarterly, or at other intervals:
depending on the criticality of the information needing protection
depending on the criticality of the information needing protection and the password's frequency of use
depending on the password's frequency of use
not depending on the criticality of the information needing protection but depending on the password's
frequency of use
Answer: B
Explanation
Passwords can be compromised and must be protected. In the ideal case, a password should only be used once.
The changing of passwords can also fall between these two extremes. Passwords can be required to change
monthly, quarterly, or at other intervals, depending on the criticality of the information needing protection and
the password's frequency of use. Obviously, the more times a password is used, the more chance there is of it
being compromised.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
Computer Security, 2001, John Wiley & Sons, Page 36 & 37.
Question #:6 - (Exam Topic 1)
Which of the following statements pertaining to Kerberos is false?
The Key Distribution Center represents a single point of failure.
Kerberos manages access permissions.
Kerberos uses a database to keep a copy of all users' public keys.
Kerberos uses symmetric key cryptography.
Answer: C
Explanation
Kerberos is a trusted, credential-based, third-party authentication protocol that uses symmetric (secret) key
cryptography to provide robust authentication to clients accessing services on a network.
One weakness of Kerberos is its Key Distribution Center (KDC), which represents a single point of failure.
ISC - SSCPCerts Exam
8 of 14Pass with Valid Exam Questions Pool
The KDC contains a database that holds a copy of all of the symmetric/secret keys for the principals.
Reference(s) used for this question:
KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer
Security, John Wiley & Sons, 2001, Chapter 2: Access control systems (page40).
ISC - SSCPCerts Exam
9 of 14Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
Topic 2, Security Operation Adimnistration
Question #:7 - (Exam Topic 2)
When it comes to magnetic media sanitization, what difference can be made between clearing and purging
information?
Clearing completely erases the media whereas purging only removes file headers, allowing the recovery
of files.
Clearing renders information unrecoverable by a keyboard attack and purging renders information
unrecoverable against laboratory attack.
They both involve rewriting the media.
Clearing renders information unrecoverable against a laboratory attack and purging renders information
unrecoverable to a keyboard attack.
Answer: B
Explanation
The removal of information from a storage medium is called sanitization. Different kinds of sanitization
provide different levels of protection. A distinction can be made between clearing information (rendering it
unrecoverable by a keyboard attack) and purging (rendering it unrecoverable against laboratory attack).
There are three general methods of purging media: overwriting, degaussing, and destruction.
There should be continuous assurance that sensitive information is protected and not allowed to be placed in a
circumstance wherein a possible compromise can occur. There are two primary levels of threatthat the
protector of information must guard against: keyboard attack (information scavenging through system
software capabilities) and laboratory attack (information scavenging through laboratory means). Procedures
should be implemented to address these threats before the Automated Information System (AIS) is procured,
and the procedures should be continued throughout the life cycle of the AIS.
Reference(s) use for this question:
SWANSON, Marianne & GUTTMAN, Barbara, National Institute of Standards and Technology (NIST),
NIST Special Publication 800-14, Generally Accepted Principles and Practices for Securing Information
Technology Systems, September 1996 (page 26).
and
A guide to understanding Data Remanence in Automated Information Systems
Question #:8 - (Exam Topic 2)
ISC - SSCPCerts Exam
10 of 14Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
Within the context of the CBK, which of the following provides a MINIMUM level of security
ACCEPTABLE for an environment ?
A baseline
A standard
A procedure
A guideline
Answer: A
Explanation
Baselines provide the minimum level of security necessary throughout the organization.
Standards specify how hardware and software products should be used throughout the organization.
Procedures are detailed step-by-step instruction on how to achieve certain tasks.
Guidelines are recommendation actions and operational guides to personnel when a specific standard does not
apply.
Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter
3: Security Management Practices (page 94).
ISC - SSCPCerts Exam
11 of 14Pass with Valid Exam Questions Pool
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
Topic 6, Network and Telecommunications
Question #:9 - (Exam Topic 6)
Which of the following was designed to support multiple network types over the same serial link?
Ethernet
SLIP
PPP
PPTP
Answer: C
Explanation
The Point-to-Point Protocol (PPP) was designed to support multiple network types over the same serial link,
just as Ethernet supports multiple network types over the same LAN. PPP replaces the earlier Serial Line
Internet Protocol (SLIP) that only supports IP over a serial link. PPTP is a tunneling protocol.
Source: STREBE, Matthew and PERKINS, Charles, Firewalls 24seven, Sybex 2000, Chapter 3: TCP/IP from
a Security Viewpoint.
Question #:10 - (Exam Topic 6)
The communications products and services, which ensure that the various components of a network (such as
devices, protocols, and access methods) work together refers to:
Netware Architecture.
Network Architecture.
WAN Architecture.
Multiprotocol Architecture.
Answer: B
Explanation
A Network Architecture refers to the communications products and services, which ensure that the various
components of a network (such as devices, protocols, and access methods) work together.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of
ISC - SSCPCerts Exam
12 of 14Pass with Valid Exam Questions Pool
Computer Security, 2001, John Wiley & Sons, Page 101.
ISC - SSCPCerts Exam
13 of 14Pass with Valid Exam Questions Pool
Topic 5, Cryptography
ISC - SSCPCerts Exam
14 of 14Pass with Valid Exam Questions Pool
Topic 3, Analysis and Monitoring
About certsout.com
certsout.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam
Questions, Study Guides, Practice Tests.
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
View list of all certification exams: All vendors
 
 
 
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses listed
below.
Sales: sales@certsout.com
Feedback: feedback@certsout.com
Support: support@certsout.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24
hours.
https://www.certsout.com
https://www.certsout.com/vendors.html
https://www.certsout.com/Apple-Practice-Test.html
https://www.certsout.com/Cisco-Practice-Test.html
https://www.certsout.com/Citrix-Practice-Test.html
https://www.certsout.com/CompTIA-Practice-Test.html
https://www.certsout.com/EMC-Practice-Test.html
https://www.certsout.com/ISC-Practice-Test.html
https://www.certsout.com/IBM-Practice-Test.html
https://www.certsout.com/Juniper-Practice-Test.html
https://www.certsout.com/Microsoft-Practice-Test.html
https://www.certsout.com/Oracle-Practice-Test.html
https://www.certsout.com/Symantec-Practice-Test.html
https://www.certsout.com/VMware-Practice-Test.html