Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions
Questions # 1:

Within the legal domain what rule is concerned with the legality of how the evidence was gathered ?

Options:

A.

Exclusionary rule


B.

Best evidence rule


C.

Hearsay rule


D.

Investigation rule


Expert Solution
Questions # 2:

A prolonged high voltage is a:

Options:

A.

spike


B.

blackout


C.

surge


D.

fault


Expert Solution
Questions # 3:

A business continuity plan is an example of which of the following?

Options:

A.

Corrective control


B.

Detective control


C.

Preventive control


D.

Compensating control


Expert Solution
Questions # 4:

Which of the following statements regarding an off-site information processing facility is TRUE?

Options:

A.

It should have the same amount of physical access restrictions as the primary processing site.


B.

It should be located in proximity to the originating site so that it can quickly be made operational.


C.

It should be easily identified from the outside so in the event of an emergency it can be easily found.


D.

Need not have the same level of environmental monitoring as the originating site since this would be cost prohibitive.


Expert Solution
Questions # 5:

Why would a memory dump be admissible as evidence in court?

Options:

A.

Because it is used to demonstrate the truth of the contents.


B.

Because it is used to identify the state of the system.


C.

Because the state of the memory cannot be used as evidence.


D.

Because of the exclusionary rule.


Expert Solution
Questions # 6:

Which of the following results in the most devastating business interruptions?

Options:

A.

Loss of Hardware/Software


B.

Loss of Data


C.

Loss of Communication Links


D.

Loss of Applications


Expert Solution
Questions # 7:

Which of the following best allows risk management results to be used knowledgeably?

Options:

A.

A vulnerability analysis


B.

A likelihood assessment


C.

An uncertainty analysis


D.

A threat identification


Expert Solution
Questions # 8:

What is called the probability that a threat to an information system will materialize?

Options:

A.

Threat


B.

Risk


C.

Vulnerability


D.

Hole


Expert Solution
Questions # 9:

Which of the following is defined as the most recent point in time to which data must be synchronized without adversely affecting the organization (financial or operational impacts)?

Options:

A.

Recovery Point Objective


B.

Recovery Time Objective


C.

Point of Time Objective


D.

Critical Time Objective


Expert Solution
Questions # 10:

Which of the following backup method must be made regardless of whether Differential or Incremental methods are used?

Options:

A.

Full Backup Method.


B.

Incremental backup method.


C.

Supplemental backup method.


D.

Tape backup method.


Expert Solution
Questions # 11:

Which of the following computer recovery sites is only partially equipped with processing equipment?

Options:

A.

hot site


B.

rolling hot site


C.

warm site


D.

cold site


Expert Solution
Questions # 12:

What would BEST define risk management?

Options:

A.

The process of eliminating the risk


B.

The process of assessing the risks


C.

The process of reducing risk to an acceptable level


D.

The process of transferring risk


Expert Solution
Questions # 13:

Which approach to a security program ensures people responsible for protecting the company's assets are DRIVING the program?

Options:

A.

The Delphi approach


B.

The top-down approach


C.

The bottom-up approach


D.

The technology approach


Expert Solution
Questions # 14:

Prior to a live disaster test also called a Full Interruption test, which of the following is most important?

Options:

A.

Restore all files in preparation for the test.


B.

Document expected findings.


C.

Arrange physical security for the test site.


D.

Conduct of a successful Parallel Test


Expert Solution
Questions # 15:

The scope and focus of the Business continuity plan development depends most on:

Options:

A.

Directives of Senior Management


B.

Business Impact Analysis (BIA)


C.

Scope and Plan Initiation


D.

Skills of BCP committee


Expert Solution
Questions # 16:

Which of the following is the most important consideration in locating an alternate computing facility during the development of a disaster recovery plan?

Options:

A.

It is unlikely to be affected by the same disaster.


B.

It is close enough to become operational quickly.


C.

It is close enough to serve its users.


D.

It is convenient to airports and hotels.


Expert Solution
Questions # 17:

After a company is out of an emergency state, what should be moved back to the original site first?

Options:

A.

Executives


B.

Least critical components


C.

IT support staff


D.

Most critical components


Expert Solution
Questions # 18:

Of the following, which is NOT a specific loss criteria that should be considered while developing a BIA?

Options:

A.

Loss of skilled workers knowledge


B.

Loss in revenue


C.

Loss in profits


D.

Loss in reputation


Expert Solution
Questions # 19:

What is electronic vaulting?

Options:

A.

Information is backed up to tape on a hourly basis and is stored in a on-site vault.


B.

Information is backed up to tape on a daily basis and is stored in a on-site vault.


C.

Transferring electronic journals or transaction logs to an off-site storage facility


D.

A transfer of bulk information to a remote central backup facility.


Expert Solution
Questions # 20:

Which of the following should be emphasized during the Business Impact Analysis (BIA) considering that the BIA focus is on business processes?

Options:

A.

Composition


B.

Priorities


C.

Dependencies


D.

Service levels


Expert Solution
Viewing page 1 out of 14 pages
Viewing questions 1-20 out of questions