Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 81

The type of discretionary access control (DAC) that is based on an individual's identity is also called:

A.

Identity-based Access control

B.

Rule-based Access control

C.

Non-Discretionary Access Control

D.

Lattice-based Access control

Full Access
Question # 82

Which of the following would be used to implement Mandatory Access Control (MAC)?

A.

Clark-Wilson Access Control

B.

Role-based access control

C.

Lattice-based access control

D.

User dictated access control

Full Access
Question # 83

Which of the following reviews system and event logs to detect attacks on the host and determine if the attack was successful?

A.

host-based IDS

B.

firewall-based IDS

C.

bastion-based IDS

D.

server-based IDS

Full Access
Question # 84

What is the primary goal of setting up a honeypot?

A.

To lure hackers into attacking unused systems

B.

To entrap and track down possible hackers

C.

To set up a sacrificial lamb on the network

D.

To know when certain types of attacks are in progress and to learn about attack techniques so the network can be fortified.

Full Access
Question # 85

Which of the following would NOT violate the Due Diligence concept?

A.

Security policy being outdated

B.

Data owners not laying out the foundation of data protection

C.

Network administrator not taking mandatory two-week vacation as planned

D.

Latest security patches for servers being installed as per the Patch Management process

Full Access
Question # 86

Attributes that characterize an attack are stored for reference using which of the following Intrusion Detection System (IDS) ?

A.

signature-based IDS

B.

statistical anomaly-based IDS

C.

event-based IDS

D.

inferent-based IDS

Full Access
Question # 87

A timely review of system access audit records would be an example of which of the basic security functions?

A.

avoidance

B.

deterrence

C.

prevention

D.

detection

Full Access
Question # 88

What is also known as 10Base5?

A.

Thinnet

B.

Thicknet

C.

ARCnet

D.

UTP

Full Access
Go to page: