Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 49

Which of the following would assist the most in Host Based intrusion detection?

A.

audit trails.

B.

access control lists.

C.

security clearances

D.

host-based authentication

Full Access
Question # 50

Which of the following is most likely to be useful in detecting intrusions?

A.

Access control lists

B.

Security labels

C.

Audit trails

D.

Information security policies

Full Access
Question # 51

The session layer provides a logical persistent connection between peer hosts. Which of the following is one of the modes used in the session layer to establish this connection?

A.

Full duplex

B.

Synchronous

C.

Asynchronous

D.

Half simplex

Full Access
Question # 52

Which of the following enables the person responsible for contingency planning to focus risk management efforts and resources in a prioritized manner only on the identified risks?

A.

Risk assessment

B.

Residual risks

C.

Security controls

D.

Business units

Full Access
Question # 53

Virus scanning and content inspection of SMIME encrypted e-mail without doing any further processing is:

A.

Not possible

B.

Only possible with key recovery scheme of all user keys

C.

It is possible only if X509 Version 3 certificates are used

D.

It is possible only by "brute force" decryption

Full Access
Question # 54

What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?

A.

Data fiddling

B.

Data diddling

C.

Salami techniques

D.

Trojan horses

Full Access
Question # 55

In biometric identification systems, the parts of the body conveniently available for identification are:

A.

neck and mouth

B.

hands, face, and eyes

C.

feet and hair

D.

voice and neck

Full Access
Question # 56

Like the Kerberos protocol, SESAME is also subject to which of the following?

A.

timeslot replay

B.

password guessing

C.

symmetric key guessing

D.

asymmetric key guessing

Full Access
Go to page: