Download of SSCP exam guide materials and discount pack for ISC2 certification for IT professionals, Real Success Guaranteed with Updated SSCP pdf dumps vce Materials. 100% PASS System Security Certified Practitioner (SSCP) exam Today!

Q65. ORRECT TEXT 

___________________ is responsible for creating security policies and for communicating those policies to system users. 

A. ISO

Answer: A


Q66. A ___________ is a program that poses as a useful or legitimate program, but turns out to be malicious code. 

A. Worm 

B. Trojan Horse 

C. Logic Bomb 

D. Polymorphic Virus 

Answer:


Q67. Lightweight Directory Access Protocol?

A. L2TP 

B. LDAP 

C. L2F 

D. PPTP 

Answer:


Q68. A program that intentionally leaves a security hole or covert method of access is referred to as a ___________. 

A. Logic bomb 

B. Back door 

C. Trojan horse 

D. Honey pot 

Answer:


Q69. Define the acronym RBAC 

A. Role BasedAccess Center 

B. Rule BasedAccess Center 

C. Role Based Access Control 

D. Rule Based Access Control 

Answer:


Q70. Which of the concepts best describes Availability in relation to computer resources? 

A. Users can gain access to any resource upon request (assuming they have proper permissions) 

B. Users can make authorized changes to data 

C. Users can be assured that the data content has not been altered 

D. None of the concepts describes Availability properly 

Answer:


Q71. What is the main difference between computer abuse and computer crime? 

A. Amount of damage 

B. Intentions of the perpetrator 

C. Method of compromise 

D. Abuse = company insider; crime = company outsider 

Answer:


Q72. The standard of __________ states that a certain level of integrity and information protection levels will be maintained. 

A. Due Diligence 

B. Due Process 

C. Due Care 

D. BSO 1799 

Answer: