Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

ISC SSCP Exam Made Easy: Step-by-Step Preparation Guide

Questions 61

Which of the following computer design approaches is based on the fact that in earlier technologies, the instruction fetch was the longest part of the cycle?

Options:

A.

Pipelining

B.

Reduced Instruction Set Computers (RISC)

C.

Complex Instruction Set Computers (CISC)

D.

Scalar processors

Buy Now
Questions 62

Step-by-step instructions used to satisfy control requirements is called a:

Options:

A.

policy

B.

standard

C.

guideline

D.

procedure

Buy Now
Questions 63

Which of the following describes a technique in which a number of processor units are employed in a single computer system to increase the performance of the system in its application environment above the performance of a single processor of the same kind?

Options:

A.

Multitasking

B.

Multiprogramming

C.

Pipelining

D.

Multiprocessing

Buy Now
Questions 64

What is it called when a computer uses more than one CPU in parallel to execute instructions?

Options:

A.

Multiprocessing

B.

Multitasking

C.

Multithreading

D.

Parallel running

Buy Now
Questions 65

Which of the following phases of a software development life cycle normally addresses Due Care and Due Diligence?

Options:

A.

Implementation

B.

System feasibility

C.

Product design

D.

Software plans and requirements

Buy Now
Questions 66

Which of the following is less likely to be included in the change control sub-phase of the maintenance phase of a software product?

Options:

A.

Estimating the cost of the changes requested

B.

Recreating and analyzing the problem

C.

Determining the interface that is presented to the user

D.

Establishing the priorities of requests

Buy Now
Questions 67

Which of the following is NOT an administrative control?

Options:

A.

Logical access control mechanisms

B.

Screening of personnel

C.

Development of policies, standards, procedures and guidelines

D.

Change control procedures

Buy Now
Questions 68

What does "System Integrity" mean?

Options:

A.

The software of the system has been implemented as designed.

B.

Users can't tamper with processes they do not own.

C.

Hardware and firmware have undergone periodic testing to verify that they are functioning properly.

D.

Design specifications have been verified against the formal top-level specification.

Buy Now
Questions 69

As per the Orange Book, what are two types of system assurance?

Options:

A.

Operational Assurance and Architectural Assurance.

B.

Design Assurance and Implementation Assurance.

C.

Architectural Assurance and Implementation Assurance.

D.

Operational Assurance and Life-Cycle Assurance.

Buy Now
Questions 70

Which of the following is used in database information security to hide information?

Options:

A.

Inheritance

B.

Polyinstantiation

C.

Polymorphism

D.

Delegation

Buy Now
Questions 71

A 'Pseudo flaw' is which of the following?

Options:

A.

An apparent loophole deliberately implanted in an operating system program as a trap for intruders.

B.

An omission when generating Psuedo-code.

C.

Used for testing for bounds violations in application programming.

D.

A normally generated page fault causing the system to halt.

Buy Now
Questions 72

Which of the following does not address Database Management Systems (DBMS) Security?

Options:

A.

Perturbation

B.

Cell suppression

C.

Padded cells

D.

Partitioning

Buy Now
Questions 73

Which of the following is not appropriate in addressing object reuse?

Options:

A.

Degaussing magnetic tapes when they're no longer needed.

B.

Deleting files on disk before reusing the space.

C.

Clearing memory blocks before they are allocated to a program or data.

D.

Clearing buffered pages, documents, or screens from the local memory of a terminal or printer.

Buy Now
Questions 74

In Mandatory Access Control, sensitivity labels attached to object contain what information?

Options:

A.

The item's classification

B.

The item's classification and category set

C.

The item's category

D.

The items's need to know

Buy Now
Questions 75

Degaussing is used to clear data from all of the following medias except:

Options:

A.

Floppy Disks

B.

Read-Only Media

C.

Video Tapes

D.

Magnetic Hard Disks

Buy Now
Questions 76

Who should DECIDE how a company should approach security and what security measures should be implemented?

Options:

A.

Senior management

B.

Data owner

C.

Auditor

D.

The information security specialist

Buy Now
Questions 77

What can be defined as an instance of two different keys generating the same ciphertext from the same plaintext?

Options:

A.

Key collision

B.

Key clustering

C.

Hashing

D.

Ciphertext collision

Buy Now
Questions 78

Which of the following is not a property of the Rijndael block cipher algorithm?

Options:

A.

It employs a round transformation that is comprised of three layers of distinct and invertible transformations.

B.

It is suited for high speed chips with no area restrictions.

C.

It operates on 64-bit plaintext blocks and uses a 128 bit key.

D.

It could be used on a smart card.

Buy Now
Questions 79

A code, as is pertains to cryptography:

Options:

A.

Is a generic term for encryption.

B.

Is specific to substitution ciphers.

C.

Deals with linguistic units.

D.

Is specific to transposition ciphers.

Buy Now
Questions 80

What is the maximum number of different keys that can be used when encrypting with Triple DES?

Options:

A.

1

B.

2

C.

3

D.

4

Buy Now