Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 73

Controls like guards and general steps to maintain building security, securing of server rooms or laptops, the protection of cables, and usage of magnetic switches on doors and windows are some of the examples of:

A.

Administrative controls

B.

Logical controls

C.

Technical controls

D.

Physical controls

Full Access
Question # 74

Which of the following is not a logical control when implementing logical access security?

A.

access profiles.

B.

userids.

C.

employee badges.

D.

passwords.

Full Access
Question # 75

The Computer Security Policy Model the Orange Book is based on is which of the following?

A.

Bell-LaPadula

B.

Data Encryption Standard

C.

Kerberos

D.

Tempest

Full Access
Question # 76

Which of the following attacks could capture network user passwords?

A.

Data diddling

B.

Sniffing

C.

IP Spoofing

D.

Smurfing

Full Access
Question # 77

Crime Prevention Through Environmental Design (CPTED) is a discipline that:

A.

Outlines how the proper design of a physical environment can reduce crime by directly affecting human behavior.

B.

Outlines how the proper design of the logical environment can reduce crime by directly affecting human behavior.

C.

Outlines how the proper design of the detective control environment can reduce crime by directly affecting human behavior.

D.

Outlines how the proper design of the administrative control environment can reduce crime by directly affecting human behavior.

Full Access
Question # 78

Controls to keep password sniffing attacks from compromising computer systems include which of the following?

A.

static and recurring passwords.

B.

encryption and recurring passwords.

C.

one-time passwords and encryption.

D.

static and one-time passwords.

Full Access
Question # 79

A network-based vulnerability assessment is a type of test also referred to as:

A.

An active vulnerability assessment.

B.

A routing vulnerability assessment.

C.

A host-based vulnerability assessment.

D.

A passive vulnerability assessment.

Full Access
Question # 80

The primary service provided by Kerberos is which of the following?

A.

non-repudiation

B.

confidentiality

C.

authentication

D.

authorization

Full Access
Go to page: