Your success in ISC2 SSCP is our sole target and we develop all our SSCP braindumps in a way that facilitates the attainment of this target. Not only is our SSCP study material the best you can find, it is also the most detailed and the most updated. SSCP Practice Exams for ISC2 SSCP are written to the highest standards of technical accuracy.

Q25. Which of the following are valid modes of operation? (Choose all that apply) 

A. Multilevel mode 

B. Restricted mode 

C. Dedicated mode 

D. Allowed mode 

E. Access Mode 

Answer: AC 


Q26. Insiders have a clear advantage in committing computer crime. Which two of the following do they possess? (Choose two) 

A. Advantage 

B. Motive 

C. Outside connections 

D. Means 

E. Opportunity 

F. Tools 

Answer: DE 


Q27. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems. 

A. Sniffing 

B. Eavesdropping 

C. Social Engineering 

D. Shoulder Surfing 

E. None of the items are correct 

Answer:


Q28. Which of these virus incidents did not occur in 1999? (Choose all that apply) 

A. ILoveYou 

B. Chernobyl 

C. Melissa 

D. Michelangelo 

E. AnnaKournikova 

F. None of the above - they all happened in 1999 

Answer: AE 


Q29. What security control provides a method to insure that a transaction did or did not occur? 

A. Identification 

B. Accountability 

C. Nonrepudiation 

D. Verification 

E. Access control 

Answer:


Q30. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________. 

A. Avoidance 

B. Reduction 

C. Assignment 

D. Acceptance 

Answer:


Q31. Which of the following is NOT an encryption method used by VPNs (Virtual Private Networks)? 

A. IPSEC - IP Security 

B. L2F - Layer 2 Forwarding 

C. L2TP - Layer 2 Tunneling Protocol 

D. SSH - Secure Shell 

E. PPTP - Point to Point Tunneling Protocol 

F. All of the above are encryption methods used by VPNs 

Answer:


Q32. A password audit consists of checking for ____________? 

A. Minimum password length 

B. Password aging 

C. Password Strength 

D. Blank Passwords 

E. All of the items listed 

Answer: