Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

ISC SSCP Exam Made Easy: Step-by-Step Preparation Guide

Questions 181

A proxy is considered a:

Options:

A.

first generation firewall.

B.

third generation firewall.

C.

second generation firewall.

D.

fourth generation firewall.

Buy Now
Questions 182

Which of the following statements is NOT true of IPSec Transport mode?

Options:

A.

It is required for gateways providing access to internal systems

B.

Set-up when end-point is host or communications terminates at end-points

C.

If used in gateway-to-host communication, gateway must act as host

D.

When ESP is used for the security protocol, the hash is only applied to the upper layer protocols contained in the packet

Buy Now
Questions 183

In this type of attack, the intruder re-routes data traffic from a network device to a personal machine. This diversion allows an attacker to gain access to critical resources and user credentials, such as passwords, and to gain unauthorized access to critical systems of an organization. Pick the best choice below.

Options:

A.

Network Address Translation

B.

Network Address Hijacking

C.

Network Address Supernetting

D.

Network Address Sniffing

Buy Now
Questions 184

Which protocol of the TCP/IP suite addresses reliable data transport?

Options:

A.

Transmission control protocol (TCP)

B.

User datagram protocol (UDP)

C.

Internet protocol (IP)

D.

Internet control message protocol (ICMP)

Buy Now
Questions 185

Which of the following technologies is a target of XSS or CSS (Cross-Site Scripting) attacks?

Options:

A.

Web Applications

B.

Intrusion Detection Systems

C.

Firewalls

D.

DNS Servers

Buy Now
Questions 186

What is malware that can spread itself over open network connections?

Options:

A.

Worm

B.

Rootkit

C.

Adware

D.

Logic Bomb

Buy Now
Questions 187

Virus scanning and content inspection of SMIME encrypted e-mail without doing any further processing is:

Options:

A.

Not possible

B.

Only possible with key recovery scheme of all user keys

C.

It is possible only if X509 Version 3 certificates are used

D.

It is possible only by "brute force" decryption

Buy Now
Questions 188

What do the ILOVEYOU and Melissa virus attacks have in common?

Options:

A.

They are both denial-of-service (DOS) attacks.

B.

They have nothing in common.

C.

They are both masquerading attacks.

D.

They are both social engineering attacks.

Buy Now
Questions 189

Which virus category has the capability of changing its own code, making it harder to detect by anti-virus software?

Options:

A.

Stealth viruses

B.

Polymorphic viruses

C.

Trojan horses

D.

Logic bombs

Buy Now
Questions 190

What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?

Options:

A.

Data fiddling

B.

Data diddling

C.

Salami techniques

D.

Trojan horses

Buy Now
Questions 191

The high availability of multiple all-inclusive, easy-to-use hacking tools that do NOT require much technical knowledge has brought a growth in the number of which type of attackers?

Options:

A.

Black hats

B.

White hats

C.

Script kiddies

D.

Phreakers

Buy Now
Questions 192

Which of the following computer crime is MORE often associated with INSIDERS?

Options:

A.

IP spoofing

B.

Password sniffing

C.

Data diddling

D.

Denial of service (DOS)

Buy Now
Questions 193

In computing what is the name of a non-self-replicating type of malware program containing malicious code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it, when executed, carries out actions that are unknown to the person installing it, typically causing loss or theft of data, and possible system harm.

Options:

A.

virus

B.

worm

C.

Trojan horse.

D.

trapdoor

Buy Now
Questions 194

Which of the following virus types changes some of its characteristics as it spreads?

Options:

A.

Boot Sector

B.

Parasitic

C.

Stealth

D.

Polymorphic

Buy Now
Questions 195

Java is not:

Options:

A.

Object-oriented.

B.

Distributed.

C.

Architecture Specific.

D.

Multithreaded.

Buy Now
Questions 196

Crackers today are MOST often motivated by their desire to:

Options:

A.

Help the community in securing their networks.

B.

Seeing how far their skills will take them.

C.

Getting recognition for their actions.

D.

Gaining Money or Financial Gains.

Buy Now
Questions 197

Within the legal domain what rule is concerned with the legality of how the evidence was gathered ?

Options:

A.

Exclusionary rule

B.

Best evidence rule

C.

Hearsay rule

D.

Investigation rule

Buy Now
Questions 198

To protect and/or restore lost, corrupted, or deleted information, thereby preserving the data integrity and availability is the purpose of:

Options:

A.

Remote journaling.

B.

Database shadowing.

C.

A tape backup method.

D.

Mirroring.

Buy Now
Questions 199

Which backup method copies only files that have changed since the last full backup, but does not clear the archive bit?

Options:

A.

Differential backup method.

B.

Full backup method.

C.

Incremental backup method.

D.

Tape backup method.

Buy Now
Questions 200

Which of the following would BEST be defined as an absence or weakness of safeguard that could be exploited?

Options:

A.

A threat

B.

A vulnerability

C.

A risk

D.

An exposure

Buy Now