Download of SSCP exam guide materials and discount pack for ISC2 certification for IT professionals, Real Success Guaranteed with Updated SSCP pdf dumps vce Materials. 100% PASS System Security Certified Practitioner (SSCP) exam Today!
Q65. ORRECT TEXT
___________________ is responsible for creating security policies and for communicating those policies to system users.
A. ISO
Answer: A
Q66. A ___________ is a program that poses as a useful or legitimate program, but turns out to be malicious code.
A. Worm
B. Trojan Horse
C. Logic Bomb
D. Polymorphic Virus
Answer: B
Q67. Lightweight Directory Access Protocol?
A. L2TP
B. LDAP
C. L2F
D. PPTP
Answer: B
Q68. A program that intentionally leaves a security hole or covert method of access is referred to as a ___________.
A. Logic bomb
B. Back door
C. Trojan horse
D. Honey pot
Answer: B
Q69. Define the acronym RBAC
A. Role BasedAccess Center
B. Rule BasedAccess Center
C. Role Based Access Control
D. Rule Based Access Control
Answer: C
Q70. Which of the concepts best describes Availability in relation to computer resources?
A. Users can gain access to any resource upon request (assuming they have proper permissions)
B. Users can make authorized changes to data
C. Users can be assured that the data content has not been altered
D. None of the concepts describes Availability properly
Answer: A
Q71. What is the main difference between computer abuse and computer crime?
A. Amount of damage
B. Intentions of the perpetrator
C. Method of compromise
D. Abuse = company insider; crime = company outsider
Answer: B
Q72. The standard of __________ states that a certain level of integrity and information protection levels will be maintained.
A. Due Diligence
B. Due Process
C. Due Care
D. BSO 1799
Answer: C