Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 33

An Architecture where there are more than two execution domains or privilege levels is called:

A.

Ring Architecture.

B.

Ring Layering

C.

Network Environment.

D.

Security Models

Full Access
Question # 34

What is the main purpose of Corporate Security Policy?

A.

To transfer the responsibility for the information security to all users of the organization

B.

To communicate management's intentions in regards to information security

C.

To provide detailed steps for performing specific actions

D.

To provide a common framework for all development activities

Full Access
Question # 35

Which of the following is not one of the three goals of Integrity addressed by the Clark-Wilson model?

A.

Prevention of the modification of information by unauthorized users.

B.

Prevention of the unauthorized or unintentional modification of information by authorized users.

C.

Preservation of the internal and external consistency.

D.

Prevention of the modification of information by authorized users.

Full Access
Question # 36

Which of the following is used to monitor network traffic or to monitor host audit logs in real time to determine violations of system security policy that have taken place?

A.

Intrusion Detection System

B.

Compliance Validation System

C.

Intrusion Management System (IMS)

D.

Compliance Monitoring System

Full Access
Question # 37

Which of the following usually provides reliable, real-time information without consuming network or host resources?

A.

network-based IDS

B.

host-based IDS

C.

application-based IDS

D.

firewall-based IDS

Full Access
Question # 38

The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system is referred to as?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Reliability

Full Access
Question # 39

Which of the following is the act of performing tests and evaluations to test a system's security level to see if it complies with the design specifications and security requirements?

A.

Validation

B.

Verification

C.

Assessment

D.

Accuracy

Full Access
Question # 40

At what stage of the applications development process should the security department become involved?

A.

Prior to the implementation

B.

Prior to systems testing

C.

During unit testing

D.

During requirements development

Full Access
Go to page: