Which means that, for those who have considered placing your ISC2 SSCP credential after your company name, remember it lets you do employ a identified and really serious cost. Whether you are considering acquiring your current ISC2 SSCP qualifications ( System Security Certified Practitioner (SSCP) ) you will be regarding on observe toward taking your career to an alternative and level.

2021 Sep SSCP exam answers

Q1. A _________ is an information path that is not normally used for communication within a computer system. It is not protected by the any of the systems security mechanisms. 

A. Trojaned program 

B. Backdoor 

C. Covert channel 

D. Hijacked session 

E. Back-path 

Answer: C


Q2. Name three SSO types? (Choose three) 

A. KryptoKnight 

B. Kerberos 

C. Clipper 

D. SESAME 

E. DES 

Answer: ABD 


Q3. What security control provides a method to insure that a transaction did or did not occur? 

A. Identification 

B. Accountability 

C. Nonrepudiation 

D. Verification 

E. Access control 

Answer: C 


Q4. ORRECT TEXT 

A ___________ is a signal sent from a receiving machine to another host asking it to slow down the rate at which it is sending information. 

A. Source Quench

Answer: A


Q5. ORRECT TEXT 

An attempt to break an encryption algorithm is called _____________. 

A. Cryptanalysis

Answer: A


SSCP free practice exam

Improved SSCP practice exam:

Q6. ORRECT TEXT 

___________________ is responsible for creating security policies and for communicating those policies to system users. 

A. ISO

Answer: A


Q7. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________. 

A. Avoidance 

B. Reduction 

C. Assignment 

D. Acceptance 

Answer: C 


Q8. Threat assessment has four major components, name them. (Choose four) 

A. Type 

B. Mechanism 

C. Impact 

D. Probability 

E. ALE - Annual Loss Expectancy 

Answer: ABCD 


Q9. A true network security audit does include an audit for modems? 

A. True 

B. False 

Answer: A 


Q10. Authentication is based on which of the following:<br>(Choose three) 

A. Something you are 

B. Something you input 

C. Something you know 

D. Something you compute 

E. Something you have 

Answer: ACE