Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the ISC 2 Credentials SSCP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam SSCP Premium Access

View all detail and faqs for the SSCP exam


378 Students Passed

87% Average Score

92% Same Questions
Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions
Questions # 1:

The major objective of system configuration management is which of the following?

Options:

A.

system maintenance.

B.

system stability.

C.

system operations.

D.

system tracking.

Questions # 2:

Which of the following is less likely to be included in the change control sub-phase of the maintenance phase of a software product?

Options:

A.

Estimating the cost of the changes requested

B.

Recreating and analyzing the problem

C.

Determining the interface that is presented to the user

D.

Establishing the priorities of requests

Questions # 3:

Which of the following is often the greatest challenge of distributed computing solutions?

Options:

A.

scalability

B.

security

C.

heterogeneity

D.

usability

Questions # 4:

An Architecture where there are more than two execution domains or privilege levels is called:

Options:

A.

Ring Architecture.

B.

Ring Layering

C.

Network Environment.

D.

Security Models

Questions # 5:

What is the most secure way to dispose of information on a CD-ROM?

Options:

A.

Sanitizing

B.

Physical damage

C.

Degaussing

D.

Physical destruction

Questions # 6:

When two or more separate entities (usually persons) operating in concert to protect sensitive functions or information must combine their knowledge to gain access to an asset, this is known as?

Options:

A.

Dual Control

B.

Need to know

C.

Separation of duties

D.

Segragation of duties

Questions # 7:

Which of the following choices describe a condition when RAM and Secondary storage are used together?

Options:

A.

Primary storage

B.

Secondary storage

C.

Virtual storage

D.

Real storage

Questions # 8:

Related to information security, the guarantee that the message sent is the message received with the assurance that the message was not intentionally or unintentionally altered is an example of which of the following?

Options:

A.

integrity

B.

confidentiality

C.

availability

D.

identity

Questions # 9:

As per the Orange Book, what are two types of system assurance?

Options:

A.

Operational Assurance and Architectural Assurance.

B.

Design Assurance and Implementation Assurance.

C.

Architectural Assurance and Implementation Assurance.

D.

Operational Assurance and Life-Cycle Assurance.

Questions # 10:

A channel within a computer system or network that is designed for the authorized transfer of information is identified as a(n)?

Options:

A.

Covert channel

B.

Overt channel

C.

Opened channel

D.

Closed channel

Questions # 11:

Which of the following describes a technique in which a number of processor units are employed in a single computer system to increase the performance of the system in its application environment above the performance of a single processor of the same kind?

Options:

A.

Multitasking

B.

Multiprogramming

C.

Pipelining

D.

Multiprocessing

Questions # 12:

Which of the following is based on the premise that the quality of a software product is a direct function of the quality of its associated software development and maintenance processes?

Options:

A.

The Software Capability Maturity Model (CMM)

B.

The Spiral Model

C.

The Waterfall Model

D.

Expert Systems Model

Questions # 13:

Which of the following determines that the product developed meets the projects goals?

Options:

A.

verification

B.

validation

C.

concurrence

D.

accuracy

Questions # 14:

Which of the following security mode of operation does NOT require all users to have the clearance for all information processed on the system?

Options:

A.

Compartmented security mode

B.

Multilevel security mode

C.

System-high security mode

D.

Dedicated security mode

Questions # 15:

A security evaluation report and an accreditation statement are produced in which of the following phases of the system development life cycle?

Options:

A.

project initiation and planning phase

B.

system design specification phase

C.

development & documentation phase

D.

acceptance phase

Questions # 16:

Which expert system operating mode allows determining if a given hypothesis is valid?

Options:

A.

Blackboard

B.

Lateral chaining

C.

Forward chaining

D.

Backward chaining

Questions # 17:

When it comes to magnetic media sanitization, what difference can be made between clearing and purging information?

Options:

A.

Clearing completely erases the media whereas purging only removes file headers, allowing the recovery of files.

B.

Clearing renders information unrecoverable by a keyboard attack and purging renders information unrecoverable against laboratory attack.

C.

They both involve rewriting the media.

D.

Clearing renders information unrecoverable against a laboratory attack and purging renders information unrecoverable to a keyboard attack.

Questions # 18:

What is the goal of the Maintenance phase in a common development process of a security policy?

Options:

A.

to review the document on the specified review date

B.

publication within the organization

C.

to write a proposal to management that states the objectives of the policy

D.

to present the document to an approving body

Questions # 19:

Which of the following would provide the BEST stress testing environment taking under consideration and avoiding possible data exposure and leaks of sensitive data?

Options:

A.

Test environment using test data.

B.

Test environment using sanitized live workloads data.

C.

Production environment using test data.

D.

Production environment using sanitized live workloads data.

Questions # 20:

Which of the following statements pertaining to protection rings is false?

Options:

A.

They provide strict boundaries and definitions on what the processes that work within each ring can access.

B.

Programs operating in inner rings are usually referred to as existing in a privileged mode.

C.

They support the CIA triad requirements of multitasking operating systems.

D.

They provide users with a direct access to peripherals

Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.