Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 14 out of 14 pages
Viewing questions 261-280 out of questions
Questions # 261:

Which of the following best describes the purpose of debugging programs?

Options:

A.

To generate random data that can be used to test programs before implementing them.


B.

To ensure that program coding flaws are detected and corrected.


C.

To protect, during the programming phase, valid changes from being overwritten by other changes.


D.

To compare source code versions before transferring to the test environment


Expert Solution
Questions # 262:

Which of the following best corresponds to the type of memory addressing where the address location that is specified in the program instruction contains the address of the final desired location?

Options:

A.

Direct addressing


B.

Indirect addressing


C.

Indexed addressing


D.

Program addressing


Expert Solution
Questions # 263:

Which expert system operating mode allows determining if a given hypothesis is valid?

Options:

A.

Blackboard


B.

Lateral chaining


C.

Forward chaining


D.

Backward chaining


Expert Solution
Questions # 264:

Which of the following phases of a system development life-cycle is most concerned with establishing a good security policy as the foundation for design?

Options:

A.

Development/acquisition


B.

Implementation


C.

Initiation


D.

Maintenance


Expert Solution
Questions # 265:

A trusted system does NOT involve which of the following?

Options:

A.

Enforcement of a security policy.


B.

Sufficiency and effectiveness of mechanisms to be able to enforce a security policy.


C.

Assurance that the security policy can be enforced in an efficient and reliable manner.


D.

Independently-verifiable evidence that the security policy-enforcing mechanisms are sufficient and effective.


Expert Solution
Questions # 266:

What does "System Integrity" mean?

Options:

A.

The software of the system has been implemented as designed.


B.

Users can't tamper with processes they do not own.


C.

Hardware and firmware have undergone periodic testing to verify that they are functioning properly.


D.

Design specifications have been verified against the formal top-level specification.


Expert Solution
Questions # 267:

What is the most secure way to dispose of information on a CD-ROM?

Options:

A.

Sanitizing


B.

Physical damage


C.

Degaussing


D.

Physical destruction


Expert Solution
Questions # 268:

Which of the following is responsible for MOST of the security issues?

Options:

A.

Outside espionage


B.

Hackers


C.

Personnel


D.

Equipment failure


Expert Solution
Questions # 269:

As per the Orange Book, what are two types of system assurance?

Options:

A.

Operational Assurance and Architectural Assurance.


B.

Design Assurance and Implementation Assurance.


C.

Architectural Assurance and Implementation Assurance.


D.

Operational Assurance and Life-Cycle Assurance.


Expert Solution
Questions # 270:

Within the context of the CBK, which of the following provides a MINIMUM level of security ACCEPTABLE for an environment ?

Options:

A.

A baseline


B.

A standard


C.

A procedure


D.

A guideline


Expert Solution
Questions # 271:

Which of the following are NOT a countermeasure to traffic analysis?

Options:

A.

Padding messages.


B.

Eavesdropping.


C.

Sending noise.


D.

Faraday Cage


Expert Solution
Questions # 272:

Which must bear the primary responsibility for determining the level of protection needed for information systems resources?

Options:

A.

IS security specialists


B.

Senior Management


C.

Senior security analysts


D.

systems Auditors


Expert Solution
Questions # 273:

What is the main purpose of Corporate Security Policy?

Options:

A.

To transfer the responsibility for the information security to all users of the organization


B.

To communicate management's intentions in regards to information security


C.

To provide detailed steps for performing specific actions


D.

To provide a common framework for all development activities


Expert Solution
Questions # 274:

What can best be defined as high-level statements, beliefs, goals and objectives?

Options:

A.

Standards


B.

Policies


C.

Guidelines


D.

Procedures


Expert Solution
Questions # 275:

A security evaluation report and an accreditation statement are produced in which of the following phases of the system development life cycle?

Options:

A.

project initiation and planning phase


B.

system design specification phase


C.

development & documentation phase


D.

acceptance phase


Expert Solution
Questions # 276:

An area of the Telecommunications and Network Security domain that directly affects the Information Systems Security tenet of Availability can be defined as:

Options:

A.

Netware availability


B.

Network availability


C.

Network acceptability


D.

Network accountability


Expert Solution
Viewing page 14 out of 14 pages
Viewing questions 261-280 out of questions