Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SSCP Exam Dumps - ISC 2 Credentials Questions and Answers

Question # 54

Which of the following are additional terms used to describe knowledge-based IDS and behavior-based IDS?

Options:

A.

signature-based IDS and statistical anomaly-based IDS, respectively

B.

signature-based IDS and dynamic anomaly-based IDS, respectively

C.

anomaly-based IDS and statistical-based IDS, respectively

D.

signature-based IDS and motion anomaly-based IDS, respectively.

Buy Now
Question # 55

What do the ILOVEYOU and Melissa virus attacks have in common?

Options:

A.

They are both denial-of-service (DOS) attacks.

B.

They have nothing in common.

C.

They are both masquerading attacks.

D.

They are both social engineering attacks.

Buy Now
Question # 56

What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?

Options:

A.

Data fiddling

B.

Data diddling

C.

Salami techniques

D.

Trojan horses

Buy Now
Question # 57

Which virus category has the capability of changing its own code, making it harder to detect by anti-virus software?

Options:

A.

Stealth viruses

B.

Polymorphic viruses

C.

Trojan horses

D.

Logic bombs

Buy Now
Question # 58

Which of the following would NOT violate the Due Diligence concept?

Options:

A.

Security policy being outdated

B.

Data owners not laying out the foundation of data protection

C.

Network administrator not taking mandatory two-week vacation as planned

D.

Latest security patches for servers being installed as per the Patch Management process

Buy Now
Question # 59

What is defined as the hardware, firmware and software elements of a trusted computing base that implement the reference monitor concept?

Options:

A.

The reference monitor

B.

Protection rings

C.

A security kernel

D.

A protection domain

Buy Now
Question # 60

How often should a Business Continuity Plan be reviewed?

Options:

A.

At least once a month

B.

At least every six months

C.

At least once a year

D.

At least Quarterly

Buy Now
Question # 61

Who is responsible for providing reports to the senior management on the effectiveness of the security controls?

Options:

A.

Information systems security professionals

B.

Data owners

C.

Data custodians

D.

Information systems auditors

Buy Now
Question # 62

Which of the following is a disadvantage of a statistical anomaly-based intrusion detection system?

Options:

A.

it may truly detect a non-attack event that had caused a momentary anomaly in the system.

B.

it may falsely detect a non-attack event that had caused a momentary anomaly in the system.

C.

it may correctly detect a non-attack event that had caused a momentary anomaly in the system.

D.

it may loosely detect a non-attack event that had caused a momentary anomaly in the system.

Buy Now
Question # 63

Which of the following is an IDS that acquires data and defines a "normal" usage profile for the network or host?

Options:

A.

Statistical Anomaly-Based ID

B.

Signature-Based ID

C.

dynamical anomaly-based ID

D.

inferential anomaly-based ID

Buy Now
Exam Code: SSCP
Exam Name: Systems Security Certified Practitioner
Last Update: Jan 31, 2025
Questions: 1074
SSCP pdf

SSCP PDF

$25.5  $84.99
SSCP Engine

SSCP Testing Engine

$28.5  $94.99
SSCP PDF + Engine

SSCP PDF + Testing Engine

$40.5  $134.99