Free SSCP Exam Braindumps

Pass your System Security Certified Practitioner (SSCP) exam with these free Questions and Answers

Page 33 of 215
QUESTION 156

- (Topic 6)
Which of the following DoD Model layer provides non-repudiation services?

  1. A. network layer.
  2. B. application layer.
  3. C. transport layer.
  4. D. data link layer.

Correct Answer: B
The Application Layer determines the identity of the communication partners and this is where Non-Repudiation service would be provided as well. See the layers below:
SSCP dumps exhibit
C:\Users\MCS\Desktop\1.jpg DOD Model DoD Model
The following answers are incorrect:
network layer. Is incorrect because the Network Layer mostly has routing protocols, ICMP, IP, and IPSEC. It it not a layer in the DoD Model. It is called the Internet Layer within the DoD model.
transport layer. Is incorrect because the Transport layer provides transparent transfer of data between end users. This is called Host-to-Host on the DoD model but sometimes some books will call it Transport as well on the DoD model.
data link layer. Is incorrect because the Data Link Layer defines the protocols that computers must follow to access the network for transmitting and receiving messages. It is part of the OSI Model. This does not exist on the DoD model, it is called the Link Layer on the DoD model.

QUESTION 157

- (Topic 3)
Attributes that characterize an attack are stored for reference using which of the following Intrusion Detection System (IDS) ?

  1. A. signature-based IDS
  2. B. statistical anomaly-based IDS
  3. C. event-based IDS
  4. D. inferent-based IDS

Correct Answer: A
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 49.

QUESTION 158

- (Topic 2)
According to private sector data classification levels, how would salary levels and medical information be classified?

  1. A. Public.
  2. B. Internal Use Only.
  3. C. Restricted.
  4. D. Confidential.

Correct Answer: D
Typically there are three to four levels of information classification used by most organizations:
Confidential: Information that, if released or disclosed outside of the organization, would create severe problems for the organization. For example, information that provides a competitive advantage is important to the technical or financial success (like trade secrets, intellectual property, or research designs), or protects the privacy of individuals would be considered confidential. Information may include payroll information, health records, credit information, formulas, technical designs, restricted regulatory information, senior management internal correspondence, or business strategies or plans. These may also be called top secret, privileged, personal, sensitive, or highly confidential. In other words this information is ok within a defined group in the company such as marketing or sales, but is not suited for release to anyone else in the company without permission.
The following answers are incorrect:
Public: Information that may be disclosed to the general public without concern for harming the company, employees, or business partners. No special protections are required, and information in this category is sometimes referred to as unclassified. For example, information that is posted to a company’s public Internet site, publicly released announcements, marketing materials, cafeteria menus, and any internal documents that would not present harm to the company if they were disclosed would be classified as public. While there is little concern for confidentiality, integrity and availability should be considered.
Internal Use Only: Information that could be disclosed within the company, but could harm the company if disclosed externally. Information such as customer lists, vendor pricing, organizational policies, standards and procedures, and internal organization announcements would need baseline security protections, but do not rise to the level of protection as confidential information. In other words, the information may be used freely within the company but any unapproved use outside the company can pose a chance of harm.
Restricted: Information that requires the utmost protection or, if discovered by unauthorized personnel, would cause irreparable harm to the organization would have the highest level of classification. There may be very few pieces of information like this within an organization, but data classified at this level requires all the access control and protection mechanisms available to the organization. Even when information classified at this level exists, there will be few copies of it
Reference(s) Used for this question:
Hernandez CISSP, Steven (2012-12-21). Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press) (Kindle Locations 952-976). Auerbach Publications. Kindle Edition.

QUESTION 159

- (Topic 1)
Which type of attack involves impersonating a user or a system?

  1. A. Smurfing attack
  2. B. Spoofing attack
  3. C. Spamming attack
  4. D. Sniffing attack

Correct Answer: B
A spoofing attack is when an attempt is made to gain access to a computer system by posing as an authorized user or system. Spamming refers to sending out or posting junk advertising and unsolicited mail. A smurf attack is a type of denial-of-service attack using PING and a spoofed address. Sniffing refers to observing packets passing on a network.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the
Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 77).

QUESTION 160

- (Topic 2)
The security of a computer application is most effective and economical in which of the following cases?

  1. A. The system is optimized prior to the addition of security.
  2. B. The system is procured off-the-shelf.
  3. C. The system is customized to meet the specific security threat.
  4. D. The system is originally designed to provide the necessary security.

Correct Answer: D
The earlier in the process that security is planned for and implement the cheaper it is. It is also much more efficient if security is addressed in each phase of the development cycle rather than an add-on because it gets more complicated to add at the end. If security plan is developed at the beginning it ensures that security won't be overlooked.
The following answers are incorrect:
The system is optimized prior to the addition of security. Is incorrect because if you wait to implement security after a system is completed the cost of adding security increases dramtically and can become much more complex.
The system is procured off-the-shelf. Is incorrect because it is often difficult to add security to off-the shelf systems.
The system is customized to meet the specific security threat. Is incorrect because this is a distractor. This implies only a single threat.

Page 33 of 215

Post your Comments and Discuss ISC2 SSCP exam with other Community members: