Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 5 out of 14 pages
Viewing questions 81-100 out of questions
Questions # 81:

Which conceptual approach to intrusion detection system is the most common?

Options:

A.

Behavior-based intrusion detection


B.

Knowledge-based intrusion detection


C.

Statistical anomaly-based intrusion detection


D.

Host-based intrusion detection


Expert Solution
Questions # 82:

If an organization were to monitor their employees' e-mail, it should not:

Options:

A.

Monitor only a limited number of employees.


B.

Inform all employees that e-mail is being monitored.


C.

Explain who can read the e-mail and how long it is backed up.


D.

Explain what is considered an acceptable use of the e-mail system.


Expert Solution
Questions # 83:

Which of the following monitors network traffic in real time?

Options:

A.

network-based IDS


B.

host-based IDS


C.

application-based IDS


D.

firewall-based IDS


Expert Solution
Questions # 84:

What IDS approach relies on a database of known attacks?

Options:

A.

Signature-based intrusion detection


B.

Statistical anomaly-based intrusion detection


C.

Behavior-based intrusion detection


D.

Network-based intrusion detection


Expert Solution
Questions # 85:

In an online transaction processing system (OLTP), which of the following actions should be taken when erroneous or invalid transactions are detected?

Options:

A.

The transactions should be dropped from processing.


B.

The transactions should be processed after the program makes adjustments.


C.

The transactions should be written to a report and reviewed.


D.

The transactions should be corrected and reprocessed.


Expert Solution
Questions # 86:

Which of the following would NOT violate the Due Diligence concept?

Options:

A.

Security policy being outdated


B.

Data owners not laying out the foundation of data protection


C.

Network administrator not taking mandatory two-week vacation as planned


D.

Latest security patches for servers being installed as per the Patch Management process


Expert Solution
Questions # 87:

Which of the following are additional terms used to describe knowledge-based IDS and behavior-based IDS?

Options:

A.

signature-based IDS and statistical anomaly-based IDS, respectively


B.

signature-based IDS and dynamic anomaly-based IDS, respectively


C.

anomaly-based IDS and statistical-based IDS, respectively


D.

signature-based IDS and motion anomaly-based IDS, respectively.


Expert Solution
Questions # 88:

A host-based IDS is resident on which of the following?

Options:

A.

On each of the critical hosts


B.

decentralized hosts


C.

central hosts


D.

bastion hosts


Expert Solution
Questions # 89:

Which of the following would assist the most in Host Based intrusion detection?

Options:

A.

audit trails.


B.

access control lists.


C.

security clearances


D.

host-based authentication


Expert Solution
Questions # 90:

Why would anomaly detection IDSs often generate a large number of false positives?

Options:

A.

Because they can only identify correctly attacks they already know about.


B.

Because they are application-based are more subject to attacks.


C.

Because they can't identify abnormal behavior.


D.

Because normal patterns of user and system behavior can vary wildly.


Expert Solution
Questions # 91:

A timely review of system access audit records would be an example of which of the basic security functions?

Options:

A.

avoidance


B.

deterrence


C.

prevention


D.

detection


Expert Solution
Questions # 92:

Knowledge-based Intrusion Detection Systems (IDS) are more common than:

Options:

A.

Network-based IDS


B.

Host-based IDS


C.

Behavior-based IDS


D.

Application-Based IDS


Expert Solution
Questions # 93:

Which of the following technologies is a target of XSS or CSS (Cross-Site Scripting) attacks?

Options:

A.

Web Applications


B.

Intrusion Detection Systems


C.

Firewalls


D.

DNS Servers


Expert Solution
Questions # 94:

Which virus category has the capability of changing its own code, making it harder to detect by anti-virus software?

Options:

A.

Stealth viruses


B.

Polymorphic viruses


C.

Trojan horses


D.

Logic bombs


Expert Solution
Questions # 95:

Which of the following computer crime is MORE often associated with INSIDERS?

Options:

A.

IP spoofing


B.

Password sniffing


C.

Data diddling


D.

Denial of service (DOS)


Expert Solution
Questions # 96:

Virus scanning and content inspection of SMIME encrypted e-mail without doing any further processing is:

Options:

A.

Not possible


B.

Only possible with key recovery scheme of all user keys


C.

It is possible only if X509 Version 3 certificates are used


D.

It is possible only by "brute force" decryption


Expert Solution
Questions # 97:

In computing what is the name of a non-self-replicating type of malware program containing malicious code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it, when executed, carries out actions that are unknown to the person installing it, typically causing loss or theft of data, and possible system harm.

Options:

A.

virus


B.

worm


C.

Trojan horse.


D.

trapdoor


Expert Solution
Questions # 98:

Java is not:

Options:

A.

Object-oriented.


B.

Distributed.


C.

Architecture Specific.


D.

Multithreaded.


Expert Solution
Questions # 99:

The high availability of multiple all-inclusive, easy-to-use hacking tools that do NOT require much technical knowledge has brought a growth in the number of which type of attackers?

Options:

A.

Black hats


B.

White hats


C.

Script kiddies


D.

Phreakers


Expert Solution
Questions # 100:

What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?

Options:

A.

Data fiddling


B.

Data diddling


C.

Salami techniques


D.

Trojan horses


Expert Solution
Viewing page 5 out of 14 pages
Viewing questions 81-100 out of questions