Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 3 out of 14 pages
Viewing questions 41-60 out of questions
Questions # 41:

Which backup method only copies files that have been recently added or changed and also leaves the archive bit unchanged?

Options:

A.

Full backup method


B.

Incremental backup method


C.

Fast backup method


D.

Differential backup method


Expert Solution
Questions # 42:

Which backup method is additive because the time and tape space required for each night's backup grows during the week as it copies the day's changed files and the previous days' changed files up to the last full backup?

Options:

A.

differential backup method


B.

full backup method


C.

incremental backup method


D.

tape backup method.


Expert Solution
Questions # 43:

Which of the following tasks is NOT usually part of a Business Impact Analysis (BIA)?

Options:

A.

Calculate the risk for each different business function.


B.

Identify the company’s critical business functions.


C.

Calculate how long these functions can survive without these resources.


D.

Develop a mission statement.


Expert Solution
Questions # 44:

What can be described as a measure of the magnitude of loss or impact on the value of an asset?

Options:

A.

Probability


B.

Exposure factor


C.

Vulnerability


D.

Threat


Expert Solution
Questions # 45:

Out of the steps listed below, which one is not one of the steps conducted during the Business Impact Analysis (BIA)?

Options:

A.

Alternate site selection


B.

Create data-gathering techniques


C.

Identify the company’s critical business functions


D.

Select individuals to interview for data gathering


Expert Solution
Questions # 46:

Which of the following statements do not apply to a hot site?

Options:

A.

It is expensive.


B.

There are cases of common overselling of processing capabilities by the service provider.


C.

It provides a false sense of security.


D.

It is accessible on a first come first serve basis. In case of large disaster it might not be accessible.


Expert Solution
Questions # 47:

In what way can violation clipping levels assist in violation tracking and analysis?

Options:

A.

Clipping levels set a baseline for acceptable normal user errors, and violations exceeding that threshold will be recorded for analysis of why the violations occurred.


B.

Clipping levels enable a security administrator to customize the audit trail to record only those violations which are deemed to be security relevant.


C.

Clipping levels enable the security administrator to customize the audit trail to record only actions for users with access to user accounts with a privileged status.


D.

Clipping levels enable a security administrator to view all reductions in security levels which have been made to user accounts which have incurred violations.


Expert Solution
Questions # 48:

Which of the following is used to monitor network traffic or to monitor host audit logs in real time to determine violations of system security policy that have taken place?

Options:

A.

Intrusion Detection System


B.

Compliance Validation System


C.

Intrusion Management System (IMS)


D.

Compliance Monitoring System


Expert Solution
Questions # 49:

Who should measure the effectiveness of Information System security related controls in an organization?

Options:

A.

The local security specialist


B.

The business manager


C.

The systems auditor


D.

The central security manager


Expert Solution
Questions # 50:

Which of the following is a disadvantage of a statistical anomaly-based intrusion detection system?

Options:

A.

it may truly detect a non-attack event that had caused a momentary anomaly in the system.


B.

it may falsely detect a non-attack event that had caused a momentary anomaly in the system.


C.

it may correctly detect a non-attack event that had caused a momentary anomaly in the system.


D.

it may loosely detect a non-attack event that had caused a momentary anomaly in the system.


Expert Solution
Questions # 51:

Which of the following questions are least likely to help in assessing controls covering audit trails?

Options:

A.

Does the audit trail provide a trace of user actions?


B.

Are incidents monitored and tracked until resolved?


C.

Is access to online logs strictly controlled?


D.

Is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?


Expert Solution
Questions # 52:

Which of the following reviews system and event logs to detect attacks on the host and determine if the attack was successful?

Options:

A.

host-based IDS


B.

firewall-based IDS


C.

bastion-based IDS


D.

server-based IDS


Expert Solution
Questions # 53:

How often should a Business Continuity Plan be reviewed?

Options:

A.

At least once a month


B.

At least every six months


C.

At least once a year


D.

At least Quarterly


Expert Solution
Questions # 54:

Which of the following is most likely to be useful in detecting intrusions?

Options:

A.

Access control lists


B.

Security labels


C.

Audit trails


D.

Information security policies


Expert Solution
Questions # 55:

Which of the following is NOT a characteristic of a host-based intrusion detection system?

Options:

A.

A HIDS does not consume large amounts of system resources


B.

A HIDS can analyse system logs, processes and resources


C.

A HIDS looks for unauthorized changes to the system


D.

A HIDS can notify system administrators when unusual events are identified


Expert Solution
Questions # 56:

As a result of a risk assessment, your security manager has determined that your organization needs to implement an intrusion detection system that can detect unknown attacks and can watch for unusual traffic behavior, such as a new service appearing on the network. What type of intrusion detection system would you select?

Options:

A.

Protocol anomaly based


B.

Pattern matching


C.

Stateful matching


D.

Traffic anomaly-based


Expert Solution
Questions # 57:

The session layer provides a logical persistent connection between peer hosts. Which of the following is one of the modes used in the session layer to establish this connection?

Options:

A.

Full duplex


B.

Synchronous


C.

Asynchronous


D.

Half simplex


Expert Solution
Questions # 58:

Which of the following usually provides reliable, real-time information without consuming network or host resources?

Options:

A.

network-based IDS


B.

host-based IDS


C.

application-based IDS


D.

firewall-based IDS


Expert Solution
Questions # 59:

In the process of gathering evidence from a computer attack, a system administrator took a series of actions which are listed below. Can you identify which one of these actions has compromised the whole evidence collection process?

Options:

A.

Using a write blocker


B.

Made a full-disk image


C.

Created a message digest for log files


D.

Displayed the contents of a folder


Expert Solution
Questions # 60:

What ensures that the control mechanisms correctly implement the security policy for the entire life cycle of an information system?

Options:

A.

Accountability controls


B.

Mandatory access controls


C.

Assurance procedures


D.

Administrative controls


Expert Solution
Viewing page 3 out of 14 pages
Viewing questions 41-60 out of questions