Final Exam
pdf
keyboard_arrow_up
School
Lehigh Carbon Community College *
*We aren’t endorsed by this school
Course
527
Subject
Information Systems
Date
Feb 20, 2024
Type
Pages
9
Uploaded by CommodoreField5003
Printed On: 18-Dec-23
Report Card for Tatiana Fleetwood-Mack - Your Grade B+ Systems Security Certified Practitioner (SSCP)
Final Exam
Result
89 %
Correct
89
Incorrect
11
Time taken
01 h 48 m
On Date
18-DEC-23
Lessons
#
Lessons
Items
Correct
1
The Business Case for Decision Assurance and Information Security
2
2
2
Information Security Fundamentals
10
8
3
Integrated Risk Management and Mitigation
10
8
4
Operationalizing Risk Mitigation
10
10
5
Communications and Network Security
10
8
6
Identity and Access Control
10
9
7
Cryptography
9
8
8
Hardware and Systems Security
9
7
9
Applications, Data, and Cloud Security
9
9
10
Incident Response and Recovery
9
9
11
Business Continuity via Information Security and People Power
9
8
12
Risks, Issues, and Opportunities, Starting Tomorrow
3
3
Page: 1 of 9
Items
Page: 2 of 9
#
Items
Correct Answer
Your Answer
Result
1
Which one of the following investigati...-a-
reasonable-doubt standard of proof?
B
B
Correct
2
Ed is tasked with protecting informati...on. What is this information known as?
B
B
Correct
3
John works as the chief information se...he ongoing operation of this business?
A
C
Incorrect
4
Juniper Content is a web content devel...ot modified. What control can you add?
A
A
Correct
5
How do you turn data into knowledge?
B
B
Correct
6
A thunderstorm knocks out the commerci... which aspect of information security?
D
D
Correct
7
Due diligence means which of the following?
C
C
Correct
8
Encrypting Files with EFS
Correct
9
Susan is working with the management t...n security is Susan trying to enforce?
C
C
Correct
10
Do the terms cybersecurity, informatio...e same thing? (Choose all that apply.)
B,D
C
Incorrect
11
The protection of intellectual propert...hat kind of information security need?
B
B
Correct
12
Which of the following are the individ...ervations, or elements of measurement?
B
B
Correct
13
Conducting Vulnerability Scanning Using Nessus
Incorrect
14
Colleen is conducting a business impac...rvice before causing irreparable harm?
A
A
Correct
15
When developing a business impact anal...st of assets. What should happen next?
C
C
Correct
Page: 3 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
#
Items
Correct Answer
Your Answer
Result
16
Jim would like to identify compromised...has access to a list of known servers?
A
A
Correct
17
Susan is configuring her network devic...ive normal operational issue messages?
D
D
Correct
18
In this image, what issue may occur be...s? Figure A: Log Properties dialog box
D
C
Incorrect
19
Tom is considering locating a business
....
What is ARO of a flood in this area?
D
D
Correct
20
What type of alternate processing faci...ons in a matter of minutes or seconds?
A
A
Correct
21
Which is the most correct statement as...nagement plans, programs, and systems?
D
D
Correct
22
Which of the following is an example of physical infrastructure hardening?
D
D
Correct
23
HAL Systems recently decided to stop o...rsue with respect to its NTP services?
D
D
Correct
24
Which of the following is not an example of technical control?
D
D
Correct
25
Kathleen needs to set up an Active Dir...type of trust does she need to create?
D
D
Correct
26
Alex is preparing to solicit bids for ...uld he require in his bidding process?
B
B
Correct
27
Mike recently implemented an intrusion... management strategy is Mike pursuing?
C
C
Correct
28
What term is used to describe a set of...ions, often provided by a third party?
B
B
Correct
29
Which group is best suited to evaluate...ion has put in place to a third party?
C
C
Correct
30
GAD Systems is concerned about the ris...g actions would support that strategy?
A
A
Correct
Page: 4 of 9
#
Items
Correct Answer
Your Answer
Result
31
Saria’s team is working to persu...f penetration test should she conduct?
D
D
Correct
32
Purchasing insurance is a form of what type of risk response?
A
A
Correct
33
What network topology is shown in the ...ing figure? Figure A: Network topology
C
C
Correct
34
TCP and UDP both operate at what layer...I (open system interconnection) model?
C
D
Incorrect
35
Adding an IPv6 Address
Correct
36
What type of motion detector uses high...sions to identify potential intruders?
C
C
Correct
37
Obtaining Information about Different IP versions
Correct
38
In the OSI model, when a data stream i...datagram, what layer has it traversed?
A
A
Correct
39
Getting Information about the Current Connection Statistics of UDP
Correct
40
Using nmap for Scanning
Correct
41
Performing Session Hijacking Using Burp Suite
Incorrect
42
Which of the following statements abou...-the-
middle (MITM) attacks is correct?
B
B
Correct
43
Ben owns a coffeehouse and wants to pr...s and passwords. How is this possible?
D
D
Correct
44
Adam is accessing a standalone file se...to complete the authorization process?
B
B
Correct
45
Susan wants to integrate her website t...gle. What technology should she adopt?
C
C
Correct
46
What type of access control allows the...ss to it using an access control list?
D
D
Correct
Page: 5 of 9
#
Items
Correct Answer
Your Answer
Result
47
Questions like What is your pet’...les of what type of identity proofing?
A
A
Correct
48
In access control authentication syste...lse positive or false negative errors?
B
B
Correct
49
James has opted to implement a NAC sol...strictly post-admission policy handle?
B
B
Correct
50
What role should zero trust architectu...ecurity strategy, plans, and programs?
C
C
Correct
51
What is the primary advantage of decentralized access control?
B
D
Incorrect
52
Owen recently designed a security acce...eck. What does this scenario describe?
C
C
Correct
53
Mike and Renee would like to use an as...y the authenticity of the certificate?
C
C
Correct
54
Alice and Bob would like to use an asy...y does she use to encrypt the message?
C
C
Correct
55
What penetration testing technique can... assess training and awareness issues?
C
C
Correct
56
What encryption algorithm is used by b...rosoft’s Encrypting File System?
C
C
Correct
57
During a system audit, Casey notices t... more than a year. What should she do?
C
C
Correct
58
What are the most common attacks that ...e of cryptography might be exposed to?
C
C
Correct
59
Nonrepudiation relies on cryptography to validate which of the following?
D
C
Incorrect
60
Ben is concerned about password cracki...ntrols would best meet this objective?
A
A
Correct
61
Ben is designing a messaging system fo...r. What goal is Ben trying to achieve?
D
D
Correct
Page: 6 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
#
Items
Correct Answer
Your Answer
Result
62
When should an organization conduct a ... that a user has to sensitive systems?
D
D
Correct
63
Maria wants to deploy an anti-malware ...uld she look for in her selected tool?
B
B
Correct
64
Which of the following statements about malware are correct?
A,B,D
C,D
Incorrect
65
What information do you need to manage...y activities? (Choose all that apply.)
A,C,D
A,B,C,D
Incorrect
66
When choosing your countermeasures and...uld start with which of the following?
D
D
Correct
67
Susan is reviewing files on a Windows ...s the best way to validate her theory?
A
A
Correct
68
Frank is the security administrator fo...otnet. What type of attack took place?
A
A
Correct
69
Kim is the system administrator for a ...of malware is Kim likely dealing with?
B
B
Correct
70
Frank discovers a missing Windows secu...ized. Where should he apply the patch?
A
A
Correct
71
As part of her malware analysis proces... goals. What is this process known as?
D
D
Correct
72
Fred is on the IT team migrating his c...ut this plan? (Choose all that apply.)
B,C
B,C
Correct
73
Many issues are involved when planning... third party? (Choose all that apply.)
B,C
B,C
Correct
74
What is the role of threat modeling wh...nt? Choose the most correct statement.
B
B
Correct
75
Which of the following is designed to ...ure in a web application architecture?
A
A
Correct
76
Jayne’s company is considering t...d advice to consider for this project?
D
D
Correct
Page: 7 of 9
#
Items
Correct Answer
Your Answer
Result
77
Lauren wants to ensure that her users ...ed. What technology should she deploy?
C
C
Correct
78
Fran's company is considering purchasi...t is Fran’s company considering?
A
A
Correct
79
Which statements about continuity and ... are correct? (Choose all that apply.)
C,D
C,D
Correct
80
What role, if any, does an incident re...nvestigation? (Choose all that apply.)
B,C,D
B,C,D
Correct
81
Nessus, OpenVAS, and SAINT are all examples of what type of tool?
D
D
Correct
82
Concho Controls is a midsize business ...ta it contains as current as possible?
D
D
Correct
83
Which one of the following investigati...collecting and preserving information?
B
B
Correct
84
Alejandro is an incident response anal...he team conduct a root-cause analysis?
C
C
Correct
85
After completing an incident response ...vements to her incident response plan?
B
B
Correct
86
During a forensic investigation, Charl...what imaging process should he follow?
B
B
Correct
87
Which one of the following is not norm...considered a business continuity task?
C
C
Correct
88
If Danielle wants to purge a drive, wh...wing options will accomplish her goal?
A
A
Correct
89
You’re the lone SSCP in the IT g...the company invest in and make use of?
C
B
Incorrect
90
Which one of the following disaster re...ion of the disaster recovery facility?
C
C
Correct
Page: 8 of 9
#
Items
Correct Answer
Your Answer
Result
91
Which plan would you expect to be driv...nce), or ALE (annual loss expectancy)?
D
D
Correct
92
Mark is planning a disaster recovery t... What type of test should Mark choose?
C
C
Correct
93
Your boss believes that your company m...might you use to respond to your boss?
C
C
Correct
94
Which statement about phishing attacks is correct?
D
D
Correct
95
In general, what differentiates phishing from whaling attacks?
A
A
Correct
96
Which one of the following metrics spe...storation of service after a disaster?
B
B
Correct
97
Which statement best describes how doe...agers, and leaders in an organization?
C
C
Correct
98
What is the best way to provide accountability for the use of identities?
A
A
Correct
99
George is assisting a prosecutor with ...nce requires George’s testimony?
D
D
Correct
100
What type of alternate processing faci... does not have a current copy of data?
B
B
Correct
Page: 9 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help