Act now and download your ISC2 SSCP test today! Do not waste time for the worthless ISC2 SSCP tutorials. Download Refresh ISC2 System Security Certified Practitioner (SSCP) exam with real questions and answers and begin to learn ISC2 SSCP with a classic professional.

Q49. ORRECT TEXT 

A type of virus that resides in a Word or Excel document is called a ___________ virus? 

A. Macro

Answer: A


Q50. Sandra has used Ethereal, a packet sniffer, to listen in on network transmissions. She has captured several passwords. What type of attack has been performed on her network? 

A. An active attack 

B. A man-the-middle attack 

C. A session hijacking 

D. A privilege escalation attack 

E. An illicit server attack 

Answer:


Q51. Inference attacks involve ___________________________. 

A. Gathering pieces of secret information to predict or guess an outcome 

B. Deciphering encrypted communications 

C. Spoofing a connection to intercept plain text transmissions 

D. Collecting unclassified pieces of information to predict or guess an outcome 

Answer:


Q52. ORRECT TEXT 

Name two types of Intrusion Detection Systems ________ and ________. 

A. host based, network based

Answer: A


Q53. ORRECT TEXT 

Unlike like viruses and worm, __________ are bogus messages that spread via email forwarding. 

A. Hoaxes

Answer: A


Q54. Which of the following is not an element of a business continuity plan? 

A. Public Relations 

B. Costs 

C. Facilities 

D. Prosecution 

E. Human Resources 

Answer:


Q55. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections. 

A. DNS Recursion 

B. NMAP 

C. Land Attack 

D. SYN Flooding 

E. Port Scanning 

Answer:


Q56. ORRECT TEXT 

________ attacks generally prevent valid authorized users from gaining access to system resources. 

A. Denial of Service

Answer: A