(ISC)2(TM) Systems Security Certified Practitioner Course Exam Questions And Answers
(ISC)2(TM) Systems Security Certified Practitioner Course Exam Questions And Answers The most common security weaknesses and exploits are in which standardized list? - ANS D. CVE - Common Vulnerabilities and Exposures Choose the password configuration rules enforced by the P Windows add-on. - ANS C. Password must have a combination of upper case, lower case, numbers, and special characters; including a 6 character minimum password length A computer forensics specialist should be attempting to attain which ultimate goal? - ANS B. Preserve electronic evidence and protect it from any alteration What term is used to describe how data is transmitted between nodes on a network or between networks, with the three common types being Broadcast, Multicast, and Unicast? - ANS A. Casting While conducting Quantitative risk analysis, which formula would be utilized? - ANS D. SLE - Single Loss Expectancy Which protocol listed below resolves a physical MAC address for a given logical IP address? - ANS A. ARP Providing optimal protection, what comprehensive array of layered security solutions resembles the layers of an onion? - ANS B. Defense in Depth Swiping a badge against a magnet reader at an entrance that unlocks the door for entry, would be which of the following? - ANS B. Single-factor authentication Encryption is attained at what layer of the OSI model? - ANS C. Presentation Layer - Layer 6 What type of encrypted string is the output of a one way hash function on a string of random length? - ANS A. fixed length What is the main difference between a phreak and a hacker? - ANS A. Phreaks specifically target telephone networks Through what method of deduction is two-factor authentication achieved using your ATM card? - ANS C. It combines something you have with something you know Accountability for the timely distribution of information security intelligence data is assumed by which organization(s)? - ANS D. All of the organizations listed Which detail concerning risk analysis would you present to leadership regarding quantitative analysis ? - ANS D. D. A and C
Written for
- Institution
- SSCP - Systems Security Certified Practitioner
- Course
- SSCP - Systems Security Certified Practitioner
Document information
- Uploaded on
- January 3, 2024
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
isc2tm systems security certified practitioner
Also available in package deal