Act now and download your ISC2 SSCP test today! Do not waste time for the worthless ISC2 SSCP tutorials. Download Most recent ISC2 System Security Certified Practitioner (SSCP) exam with real questions and answers and begin to learn ISC2 SSCP with a classic professional.

Q97. The __________ is the most dangerous part of a virus program. 

A. Code 

B. Payload 

C. Strain 

D. Trojan 

E. None of the above 

Answer:


Q98. When compiling a risk assessment report, which of the following items should be included? (Choose all that apply) 

A. Vulnerability levels 

B. Method of attack used 

C. Names of frequent security violators 

D. Data sensitivity levels 

E. ALE calculations 

Answer: ADE 


Q99. What happens if this registry value is set to 1?

 HKLM\System\CurrentControlSet\Control\Lsa\CrashonAuditFail 

A. System will crash 

B. System will continue operations as normal 

C. No such registry key exists 

D. System will perform a shutdown if maximum log size is reached 

E. System will overwrite logs 

Answer:


Q100. TCPWrappers is an example of which type of security tool? 

A. Network Based IDS 

B. Host Based IDS 

C. Personal Firewall 

D. All of the above 

E. None of the above 

Answer:


Q101. ___________________ viruses change the code order of the strain each time they replicate to another machine. 

A. Malicious 

B. Zenomorphic 

C. Worm 

D. Super 

E. Polymorphic 

Answer:


Q102. ORRECT TEXT 

Security incidents fall into a number of categories such as accidental, deliberate, and ____________. 

A. Environmental

Answer: A


Q103. Information Security policies should be __________________? (Choose all that apply) 

A. Written down 

B. ClearlyCommunicated to all system users 

C. Audited and revised periodically 

D. None of the choices listed are correct 

Answer: ABC 


Q104. Which three things must be considered for the design, planning, and implementation of access control mechanisms? (Choose three) 

A. Exposures 

B. Objectives 

C. Risks 

D. Vulnerabilities 

E. Threats 

Answer: CDE