Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 4 out of 14 pages
Viewing questions 61-80 out of questions
Questions # 61:

Which of the following tools is less likely to be used by a hacker?

Options:

A.

l0phtcrack


B.

Tripwire


C.

OphCrack


D.

John the Ripper


Expert Solution
Questions # 62:

Attributes that characterize an attack are stored for reference using which of the following Intrusion Detection System (IDS) ?

Options:

A.

signature-based IDS


B.

statistical anomaly-based IDS


C.

event-based IDS


D.

inferent-based IDS


Expert Solution
Questions # 63:

What is the primary goal of setting up a honeypot?

Options:

A.

To lure hackers into attacking unused systems


B.

To entrap and track down possible hackers


C.

To set up a sacrificial lamb on the network


D.

To know when certain types of attacks are in progress and to learn about attack techniques so the network can be fortified.


Expert Solution
Questions # 64:

The fact that a network-based IDS reviews packets payload and headers enable which of the following?

Options:

A.

Detection of denial of service


B.

Detection of all viruses


C.

Detection of data corruption


D.

Detection of all password guessing attacks


Expert Solution
Questions # 65:

Due care is not related to:

Options:

A.

Good faith


B.

Prudent man


C.

Profit


D.

Best interest


Expert Solution
Questions # 66:

Which of the following is needed for System Accountability?

Options:

A.

Audit mechanisms.


B.

Documented design as laid out in the Common Criteria.


C.

Authorization.


D.

Formal verification of system design.


Expert Solution
Questions # 67:

Which of the following is an IDS that acquires data and defines a "normal" usage profile for the network or host?

Options:

A.

Statistical Anomaly-Based ID


B.

Signature-Based ID


C.

dynamical anomaly-based ID


D.

inferential anomaly-based ID


Expert Solution
Questions # 68:

Which of the following tools is NOT likely to be used by a hacker?

Options:

A.

Nessus


B.

Saint


C.

Tripwire


D.

Nmap


Expert Solution
Questions # 69:

Which of the following is NOT a valid reason to use external penetration service firms rather than corporate resources?

Options:

A.

They are more cost-effective


B.

They offer a lack of corporate bias


C.

They use highly talented ex-hackers


D.

They ensure a more complete reporting


Expert Solution
Questions # 70:

Which of the following is not a preventive operational control?

Options:

A.

Protecting laptops, personal computers and workstations.


B.

Controlling software viruses.


C.

Controlling data media access and disposal.


D.

Conducting security awareness and technical training.


Expert Solution
Questions # 71:

Which of the following are the two MOST common implementations of Intrusion Detection Systems?

Options:

A.

Server-based and Host-based.


B.

Network-based and Guest-based.


C.

Network-based and Client-based.


D.

Network-based and Host-based.


Expert Solution
Questions # 72:

Which of the following best describes signature-based detection?

Options:

A.

Compare source code, looking for events or sets of events that could cause damage to a system or network.


B.

Compare system activity for the behaviour patterns of new attacks.


C.

Compare system activity, looking for events or sets of events that match a predefined pattern of events that describe a known attack.


D.

Compare network nodes looking for objects or sets of objects that match a predefined pattern of objects that may describe a known attack.


Expert Solution
Questions # 73:

Which of the following is an issue with signature-based intrusion detection systems?

Options:

A.

Only previously identified attack signatures are detected.


B.

Signature databases must be augmented with inferential elements.


C.

It runs only on the windows operating system


D.

Hackers can circumvent signature evaluations.


Expert Solution
Questions # 74:

Which of the following is NOT a fundamental component of an alarm in an intrusion detection system?

Options:

A.

Communications


B.

Enunciator


C.

Sensor


D.

Response


Expert Solution
Questions # 75:

In order to enable users to perform tasks and duties without having to go through extra steps it is important that the security controls and mechanisms that are in place have a degree of?

Options:

A.

Complexity


B.

Non-transparency


C.

Transparency


D.

Simplicity


Expert Solution
Questions # 76:

Several analysis methods can be employed by an IDS, each with its own strengths and weaknesses, and their applicability to any given situation should be carefully considered. There are two basic IDS analysis methods that exists. Which of the basic method is more prone to false positive?

Options:

A.

Pattern Matching (also called signature analysis)


B.

Anomaly Detection


C.

Host-based intrusion detection


D.

Network-based intrusion detection


Expert Solution
Questions # 77:

Which of the following is required in order to provide accountability?

Options:

A.

Authentication


B.

Integrity


C.

Confidentiality


D.

Audit trails


Expert Solution
Questions # 78:

A periodic review of user account management should not determine:

Options:

A.

Conformity with the concept of least privilege.


B.

Whether active accounts are still being used.


C.

Strength of user-chosen passwords.


D.

Whether management authorizations are up-to-date.


Expert Solution
Questions # 79:

Which of the following would be LESS likely to prevent an employee from reporting an incident?

Options:

A.

They are afraid of being pulled into something they don't want to be involved with.


B.

The process of reporting incidents is centralized.


C.

They are afraid of being accused of something they didn't do.


D.

They are unaware of the company's security policies and procedures.


Expert Solution
Questions # 80:

Which of the following statements pertaining to ethical hacking is incorrect?

Options:

A.

An organization should use ethical hackers who do not sell auditing, hardware, software, firewall, hosting, and/or networking services.


B.

Testing should be done remotely to simulate external threats.


C.

Ethical hacking should not involve writing to or modifying the target systems negatively.


D.

Ethical hackers never use tools that have the potential of affecting servers or services.


Expert Solution
Viewing page 4 out of 14 pages
Viewing questions 61-80 out of questions