Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 113

Which of the following backup method must be made regardless of whether Differential or Incremental methods are used?

A.

Full Backup Method.

B.

Incremental backup method.

C.

Supplemental backup method.

D.

Tape backup method.

Full Access
Question # 114

Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle?

A.

Pipelining

B.

Reduced Instruction Set Computers (RISC)

C.

Complex Instruction Set Computers (CISC)

D.

Scalar processors

Full Access
Question # 115

Which type of attack would a competitive intelligence attack best classify as?

A.

Business attack

B.

Intelligence attack

C.

Financial attack

D.

Grudge attack

Full Access
Question # 116

To be admissible in court, computer evidence must be which of the following?

A.

Relevant

B.

Decrypted

C.

Edited

D.

Incriminating

Full Access
Question # 117

Which of the following backup methods is primarily run when time and tape space permits, and is used for the system archive or baselined tape sets?

A.

full backup method.

B.

incremental backup method.

C.

differential backup method.

D.

tape backup method.

Full Access
Question # 118

What is the PRIMARY reason to maintain the chain of custody on evidence that has been collected?

A.

To ensure that no evidence is lost.

B.

To ensure that all possible evidence is gathered.

C.

To ensure that it will be admissible in court

D.

To ensure that incidents were handled with due care and due diligence.

Full Access
Question # 119

Which of the following statements pertaining to disaster recovery is incorrect?

A.

A recovery team's primary task is to get the pre-defined critical business functions at the alternate backup processing site.

B.

A salvage team's task is to ensure that the primary site returns to normal processing conditions.

C.

The disaster recovery plan should include how the company will return from the alternate site to the primary site.

D.

When returning to the primary site, the most critical applications should be brought back first.

Full Access
Question # 120

Which of the following statements regarding an off-site information processing facility is TRUE?

A.

It should have the same amount of physical access restrictions as the primary processing site.

B.

It should be located in proximity to the originating site so that it can quickly be made operational.

C.

It should be easily identified from the outside so in the event of an emergency it can be easily found.

D.

Need not have the same level of environmental monitoring as the originating site since this would be cost prohibitive.

Full Access
Go to page: