Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the ISC 2 Credentials SSCP Questions and answers with ValidTests

Exam SSCP All Questions
Exam SSCP Premium Access

View all detail and faqs for the SSCP exam

Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions
Questions # 1:

Why does compiled code pose more of a security risk than interpreted code?

Options:

A.

Because malicious code can be embedded in compiled code and be difficult to detect.

B.

If the executed compiled code fails, there is a chance it will fail insecurely.

C.

Because compilers are not reliable.

D.

There is no risk difference between interpreted code and compiled code.

Expert Solution
Questions # 2:

If an operating system permits shared resources such as memory to be used sequentially by multiple users/application or subjects without a refresh of the objects/memory area, what security problem is MOST likely to exist?

Options:

A.

Disclosure of residual data.

B.

Unauthorized obtaining of a privileged execution state.

C.

Data leakage through covert channels.

D.

Denial of service through a deadly embrace.

Expert Solution
Questions # 3:

When attempting to establish Liability, which of the following would be describe as performing the ongoing maintenance necessary to keep something in proper working order, updated, effective, or to abide by what is commonly expected in a situation?

Options:

A.

Due care

B.

Due concern

C.

Due diligence

D.

Due practice

Expert Solution
Questions # 4:

Which of the following is not a method to protect objects and the data within the objects?

Options:

A.

Layering

B.

Data mining

C.

Abstraction

D.

Data hiding

Expert Solution
Questions # 5:

Related to information security, the prevention of the intentional or unintentional unauthorized disclosure of contents is which of the following?

Options:

A.

Confidentiality

B.

Integrity

C.

Availability

D.

capability

Expert Solution
Questions # 6:

Memory management in TCSEC levels B3 and A1 operating systems may utilize "data hiding". What does this mean?

Options:

A.

System functions are layered, and none of the functions in a given layer can access data outside that layer.

B.

Auditing processes and their memory addresses cannot be accessed by user processes.

C.

Only security processes are allowed to write to ring zero memory.

D.

It is a form of strong encryption cipher.

Expert Solution
Questions # 7:

Which of the following best describes the purpose of debugging programs?

Options:

A.

To generate random data that can be used to test programs before implementing them.

B.

To ensure that program coding flaws are detected and corrected.

C.

To protect, during the programming phase, valid changes from being overwritten by other changes.

D.

To compare source code versions before transferring to the test environment

Expert Solution
Questions # 8:

Configuration Management controls what?

Options:

A.

Auditing of changes to the Trusted Computing Base.

B.

Control of changes to the Trusted Computing Base.

C.

Changes in the configuration access to the Trusted Computing Base.

D.

Auditing and controlling any changes to the Trusted Computing Base.

Expert Solution
Questions # 9:

Degaussing is used to clear data from all of the following medias except:

Options:

A.

Floppy Disks

B.

Read-Only Media

C.

Video Tapes

D.

Magnetic Hard Disks

Expert Solution
Questions # 10:

Which of the following security modes of operation involves the highest risk?

Options:

A.

Compartmented Security Mode

B.

Multilevel Security Mode

C.

System-High Security Mode

D.

Dedicated Security Mode

Expert Solution
Questions # 11:

Related to information security, confidentiality is the opposite of which of the following?

Options:

A.

closure

B.

disclosure

C.

disposal

D.

disaster

Expert Solution
Questions # 12:

The control of communications test equipment should be clearly addressed by security policy for which of the following reasons?

Options:

A.

Test equipment is easily damaged.

B.

Test equipment can be used to browse information passing on a network.

C.

Test equipment is difficult to replace if lost or stolen.

D.

Test equipment must always be available for the maintenance personnel.

Expert Solution
Questions # 13:

Preservation of confidentiality within information systems requires that the information is not disclosed to:

Options:

A.

Authorized person

B.

Unauthorized persons or processes.

C.

Unauthorized persons.

D.

Authorized persons and processes

Expert Solution
Questions # 14:

Which must bear the primary responsibility for determining the level of protection needed for information systems resources?

Options:

A.

IS security specialists

B.

Senior Management

C.

Senior security analysts

D.

systems Auditors

Expert Solution
Questions # 15:

What is the main issue with media reuse?

Options:

A.

Degaussing

B.

Data remanence

C.

Media destruction

D.

Purging

Expert Solution
Questions # 16:

Making sure that the data has not been changed unintentionally, due to an accident or malice is:

Options:

A.

Integrity.

B.

Confidentiality.

C.

Availability.

D.

Auditability.

Expert Solution
Questions # 17:

Which of the following BEST explains why computerized information systems frequently fail to meet the needs of users?

Options:

A.

Inadequate quality assurance (QA) tools.

B.

Constantly changing user needs.

C.

Inadequate user participation in defining the system's requirements.

D.

Inadequate project management.

Expert Solution
Questions # 18:

Ensuring least privilege does not require:

Options:

A.

Identifying what the user's job is.

B.

Ensuring that the user alone does not have sufficient rights to subvert an important process.

C.

Determining the minimum set of privileges required for a user to perform their duties.

D.

Restricting the user to required privileges and nothing more.

Expert Solution
Questions # 19:

An Architecture where there are more than two execution domains or privilege levels is called:

Options:

A.

Ring Architecture.

B.

Ring Layering

C.

Network Environment.

D.

Security Models

Expert Solution
Questions # 20:

Risk analysis is MOST useful when applied during which phase of the system development process?

Options:

A.

Project initiation and Planning

B.

Functional Requirements definition

C.

System Design Specification

D.

Development and Implementation

Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions