Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 2 out of 14 pages
Viewing questions 21-40 out of questions
Questions # 21:

Which of the following would be MOST important to guarantee that the computer evidence will be admissible in court?

Options:

A.

It must prove a fact that is immaterial to the case.


B.

Its reliability must be proven.


C.

The process for producing it must be documented and repeatable.


D.

The chain of custody of the evidence must show who collected, secured, controlled, handled, transported the evidence, and that it was not tampered with.


Expert Solution
Questions # 22:

What is a hot-site facility?

Options:

A.

A site with pre-installed computers, raised flooring, air conditioning, telecommunications and networking equipment, and UPS.


B.

A site in which space is reserved with pre-installed wiring and raised floors.


C.

A site with raised flooring, air conditioning, telecommunications, and networking equipment, and UPS.


D.

A site with ready made work space with telecommunications equipment, LANs, PCs, and terminals for work groups.


Expert Solution
Questions # 23:

Which of the following backup methods is primarily run when time and tape space permits, and is used for the system archive or baselined tape sets?

Options:

A.

full backup method.


B.

incremental backup method.


C.

differential backup method.


D.

tape backup method.


Expert Solution
Questions # 24:

The absence of a safeguard, or a weakness in a system that may possibly be exploited is called a(n)?

Options:

A.

Threat


B.

Exposure


C.

Vulnerability


D.

Risk


Expert Solution
Questions # 25:

Risk mitigation and risk reduction controls for providing information security are classified within three main categories, which of the following are being used?

Options:

A.

preventive, corrective, and administrative


B.

detective, corrective, and physical


C.

Physical, technical, and administrative


D.

Administrative, operational, and logical


Expert Solution
Questions # 26:

Failure of a contingency plan is usually:

Options:

A.

A technical failure.


B.

A management failure.


C.

Because of a lack of awareness.


D.

Because of a lack of training.


Expert Solution
Questions # 27:

When should a post-mortem review meeting be held after an intrusion has been properly taken care of?

Options:

A.

Within the first three months after the investigation of the intrusion is completed.


B.

Within the first week after prosecution of intruders have taken place, whether successful or not.


C.

Within the first month after the investigation of the intrusion is completed.


D.

Within the first week of completing the investigation of the intrusion.


Expert Solution
Questions # 28:

Computer-generated evidence is considered:

Options:

A.

Best evidence


B.

Second hand evidence


C.

Demonstrative evidence


D.

Direct evidence


Expert Solution
Questions # 29:

Which of the following proves or disproves a specific act through oral testimony based on information gathered through the witness's five senses?

Options:

A.

Direct evidence.


B.

Circumstantial evidence.


C.

Conclusive evidence.


D.

Corroborative evidence.


Expert Solution
Questions # 30:

Which element must computer evidence have to be admissible in court?

Options:

A.

It must be relevant.


B.

It must be annotated.


C.

It must be printed.


D.

It must contain source code.


Expert Solution
Questions # 31:

What is the highest amount a company should spend annually on countermeasures for protecting an asset valued at $1,000,000 from a threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 30%?

Options:

A.

$300,000


B.

$150,000


C.

$60,000


D.

$1,500


Expert Solution
Questions # 32:

Which backup method does not reset the archive bit on files that are backed up?

Options:

A.

Full backup method


B.

Incremental backup method


C.

Differential backup method


D.

Additive backup method


Expert Solution
Questions # 33:

An Intrusion Detection System (IDS) is what type of control?

Options:

A.

A preventive control.


B.

A detective control.


C.

A recovery control.


D.

A directive control.


Expert Solution
Questions # 34:

In which of the following phases of system development life cycle (SDLC) is contingency planning most important?

Options:

A.

Initiation


B.

Development/acquisition


C.

Implementation


D.

Operation/maintenance


Expert Solution
Questions # 35:

When first analyzing an intrusion that has just been detected and confirming that it is a true positive, which of the following actions should be done as a first step if you wish to prosecute the attacker in court?

Options:

A.

Back up the compromised systems.


B.

Identify the attacks used to gain access.


C.

Capture and record system information.


D.

Isolate the compromised systems.


Expert Solution
Questions # 36:

Within the realm of IT security, which of the following combinations best defines risk?

Options:

A.

Threat coupled with a breach


B.

Threat coupled with a vulnerability


C.

Vulnerability coupled with an attack


D.

Threat coupled with a breach of security


Expert Solution
Questions # 37:

A Business Continuity Plan should be tested:

Options:

A.

Once a month.


B.

At least twice a year.


C.

At least once a year.


D.

At least once every two years.


Expert Solution
Questions # 38:

Which of the following statements pertaining to a Criticality Survey is incorrect?

Options:

A.

It is implemented to gather input from all personnel that is going to be part of the recovery teams.


B.

The purpose of the survey must be clearly stated.


C.

Management's approval should be obtained before distributing the survey.


D.

Its intent is to find out what services and systems are critical to keeping the organization in business.


Expert Solution
Questions # 39:

Computer security should be first and foremost which of the following:

Options:

A.

Cover all identified risks


B.

Be cost-effective.


C.

Be examined in both monetary and non-monetary terms.


D.

Be proportionate to the value of IT systems.


Expert Solution
Questions # 40:

A momentary low voltage, from 1 cycle to a few seconds, is a:

Options:

A.

spike


B.

blackout


C.

sag


D.

fault


Expert Solution
Viewing page 2 out of 14 pages
Viewing questions 21-40 out of questions