Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 25

Which of the following standards concerns digital certificates?

A.

X.400

B.

X.25

C.

X.509

D.

X.75

Full Access
Question # 26

What is called the act of a user professing an identity to a system, usually in the form of a log-on ID?

A.

Authentication

B.

Identification

C.

Authorization

D.

Confidentiality

Full Access
Question # 27

Which of the following is a not a preventative control?

A.

Deny programmer access to production data.

B.

Require change requests to include information about dates, descriptions, cost analysis and anticipated effects.

C.

Run a source comparison program between control and current source periodically.

D.

Establish procedures for emergency changes.

Full Access
Question # 28

Where parties do not have a shared secret and large quantities of sensitive information must be passed, the most efficient means of transferring information is to use Hybrid Encryption Methods. What does this mean?

A.

Use of public key encryption to secure a secret key, and message encryption using the secret key.

B.

Use of the recipient's public key for encryption and decryption based on the recipient's private key.

C.

Use of software encryption assisted by a hardware encryption accelerator.

D.

Use of elliptic curve encryption.

Full Access
Question # 29

Who should DECIDE how a company should approach security and what security measures should be implemented?

A.

Senior management

B.

Data owner

C.

Auditor

D.

The information security specialist

Full Access
Question # 30

When backing up an applications system's data, which of the following is a key question to be answered first?

A.

When to make backups

B.

Where to keep backups

C.

What records to backup

D.

How to store backups

Full Access
Question # 31

What is called an exception to the search warrant requirement that allows an officer to conduct a search without having the warrant in-hand if probable cause is present and destruction of the evidence is deemed imminent?

A.

Evidence Circumstance Doctrine

B.

Exigent Circumstance Doctrine

C.

Evidence of Admissibility Doctrine

D.

Exigent Probable Doctrine

Full Access
Question # 32

Why does compiled code pose more of a security risk than interpreted code?

A.

Because malicious code can be embedded in compiled code and be difficult to detect.

B.

If the executed compiled code fails, there is a chance it will fail insecurely.

C.

Because compilers are not reliable.

D.

There is no risk difference between interpreted code and compiled code.

Full Access
Go to page: