Final Exam

pdf

School

Lehigh Carbon Community College *

*We aren’t endorsed by this school

Course

527

Subject

Information Systems

Date

Feb 20, 2024

Type

pdf

Pages

9

Uploaded by CommodoreField5003

Report
Printed On: 18-Dec-23 Report Card for Tatiana Fleetwood-Mack - Your Grade B+ Systems Security Certified Practitioner (SSCP) Final Exam Result 89 % Correct 89 Incorrect 11 Time taken 01 h 48 m On Date 18-DEC-23 Lessons # Lessons Items Correct 1 The Business Case for Decision Assurance and Information Security 2 2 2 Information Security Fundamentals 10 8 3 Integrated Risk Management and Mitigation 10 8 4 Operationalizing Risk Mitigation 10 10 5 Communications and Network Security 10 8 6 Identity and Access Control 10 9 7 Cryptography 9 8 8 Hardware and Systems Security 9 7 9 Applications, Data, and Cloud Security 9 9 10 Incident Response and Recovery 9 9 11 Business Continuity via Information Security and People Power 9 8 12 Risks, Issues, and Opportunities, Starting Tomorrow 3 3 Page: 1 of 9
Items Page: 2 of 9
# Items Correct Answer Your Answer Result 1 Which one of the following investigati...-a- reasonable-doubt standard of proof? B B Correct 2 Ed is tasked with protecting informati...on. What is this information known as? B B Correct 3 John works as the chief information se...he ongoing operation of this business? A C Incorrect 4 Juniper Content is a web content devel...ot modified. What control can you add? A A Correct 5 How do you turn data into knowledge? B B Correct 6 A thunderstorm knocks out the commerci... which aspect of information security? D D Correct 7 Due diligence means which of the following? C C Correct 8 Encrypting Files with EFS Correct 9 Susan is working with the management t...n security is Susan trying to enforce? C C Correct 10 Do the terms cybersecurity, informatio...e same thing? (Choose all that apply.) B,D C Incorrect 11 The protection of intellectual propert...hat kind of information security need? B B Correct 12 Which of the following are the individ...ervations, or elements of measurement? B B Correct 13 Conducting Vulnerability Scanning Using Nessus Incorrect 14 Colleen is conducting a business impac...rvice before causing irreparable harm? A A Correct 15 When developing a business impact anal...st of assets. What should happen next? C C Correct Page: 3 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
# Items Correct Answer Your Answer Result 16 Jim would like to identify compromised...has access to a list of known servers? A A Correct 17 Susan is configuring her network devic...ive normal operational issue messages? D D Correct 18 In this image, what issue may occur be...s? Figure A: Log Properties dialog box D C Incorrect 19 Tom is considering locating a business .... What is ARO of a flood in this area? D D Correct 20 What type of alternate processing faci...ons in a matter of minutes or seconds? A A Correct 21 Which is the most correct statement as...nagement plans, programs, and systems? D D Correct 22 Which of the following is an example of physical infrastructure hardening? D D Correct 23 HAL Systems recently decided to stop o...rsue with respect to its NTP services? D D Correct 24 Which of the following is not an example of technical control? D D Correct 25 Kathleen needs to set up an Active Dir...type of trust does she need to create? D D Correct 26 Alex is preparing to solicit bids for ...uld he require in his bidding process? B B Correct 27 Mike recently implemented an intrusion... management strategy is Mike pursuing? C C Correct 28 What term is used to describe a set of...ions, often provided by a third party? B B Correct 29 Which group is best suited to evaluate...ion has put in place to a third party? C C Correct 30 GAD Systems is concerned about the ris...g actions would support that strategy? A A Correct Page: 4 of 9
# Items Correct Answer Your Answer Result 31 Saria’s team is working to persu...f penetration test should she conduct? D D Correct 32 Purchasing insurance is a form of what type of risk response? A A Correct 33 What network topology is shown in the ...ing figure? Figure A: Network topology C C Correct 34 TCP and UDP both operate at what layer...I (open system interconnection) model? C D Incorrect 35 Adding an IPv6 Address Correct 36 What type of motion detector uses high...sions to identify potential intruders? C C Correct 37 Obtaining Information about Different IP versions Correct 38 In the OSI model, when a data stream i...datagram, what layer has it traversed? A A Correct 39 Getting Information about the Current Connection Statistics of UDP Correct 40 Using nmap for Scanning Correct 41 Performing Session Hijacking Using Burp Suite Incorrect 42 Which of the following statements abou...-the- middle (MITM) attacks is correct? B B Correct 43 Ben owns a coffeehouse and wants to pr...s and passwords. How is this possible? D D Correct 44 Adam is accessing a standalone file se...to complete the authorization process? B B Correct 45 Susan wants to integrate her website t...gle. What technology should she adopt? C C Correct 46 What type of access control allows the...ss to it using an access control list? D D Correct Page: 5 of 9
# Items Correct Answer Your Answer Result 47 Questions like What is your pet’...les of what type of identity proofing? A A Correct 48 In access control authentication syste...lse positive or false negative errors? B B Correct 49 James has opted to implement a NAC sol...strictly post-admission policy handle? B B Correct 50 What role should zero trust architectu...ecurity strategy, plans, and programs? C C Correct 51 What is the primary advantage of decentralized access control? B D Incorrect 52 Owen recently designed a security acce...eck. What does this scenario describe? C C Correct 53 Mike and Renee would like to use an as...y the authenticity of the certificate? C C Correct 54 Alice and Bob would like to use an asy...y does she use to encrypt the message? C C Correct 55 What penetration testing technique can... assess training and awareness issues? C C Correct 56 What encryption algorithm is used by b...rosoft’s Encrypting File System? C C Correct 57 During a system audit, Casey notices t... more than a year. What should she do? C C Correct 58 What are the most common attacks that ...e of cryptography might be exposed to? C C Correct 59 Nonrepudiation relies on cryptography to validate which of the following? D C Incorrect 60 Ben is concerned about password cracki...ntrols would best meet this objective? A A Correct 61 Ben is designing a messaging system fo...r. What goal is Ben trying to achieve? D D Correct Page: 6 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
# Items Correct Answer Your Answer Result 62 When should an organization conduct a ... that a user has to sensitive systems? D D Correct 63 Maria wants to deploy an anti-malware ...uld she look for in her selected tool? B B Correct 64 Which of the following statements about malware are correct? A,B,D C,D Incorrect 65 What information do you need to manage...y activities? (Choose all that apply.) A,C,D A,B,C,D Incorrect 66 When choosing your countermeasures and...uld start with which of the following? D D Correct 67 Susan is reviewing files on a Windows ...s the best way to validate her theory? A A Correct 68 Frank is the security administrator fo...otnet. What type of attack took place? A A Correct 69 Kim is the system administrator for a ...of malware is Kim likely dealing with? B B Correct 70 Frank discovers a missing Windows secu...ized. Where should he apply the patch? A A Correct 71 As part of her malware analysis proces... goals. What is this process known as? D D Correct 72 Fred is on the IT team migrating his c...ut this plan? (Choose all that apply.) B,C B,C Correct 73 Many issues are involved when planning... third party? (Choose all that apply.) B,C B,C Correct 74 What is the role of threat modeling wh...nt? Choose the most correct statement. B B Correct 75 Which of the following is designed to ...ure in a web application architecture? A A Correct 76 Jayne’s company is considering t...d advice to consider for this project? D D Correct Page: 7 of 9
# Items Correct Answer Your Answer Result 77 Lauren wants to ensure that her users ...ed. What technology should she deploy? C C Correct 78 Fran's company is considering purchasi...t is Fran’s company considering? A A Correct 79 Which statements about continuity and ... are correct? (Choose all that apply.) C,D C,D Correct 80 What role, if any, does an incident re...nvestigation? (Choose all that apply.) B,C,D B,C,D Correct 81 Nessus, OpenVAS, and SAINT are all examples of what type of tool? D D Correct 82 Concho Controls is a midsize business ...ta it contains as current as possible? D D Correct 83 Which one of the following investigati...collecting and preserving information? B B Correct 84 Alejandro is an incident response anal...he team conduct a root-cause analysis? C C Correct 85 After completing an incident response ...vements to her incident response plan? B B Correct 86 During a forensic investigation, Charl...what imaging process should he follow? B B Correct 87 Which one of the following is not norm...considered a business continuity task? C C Correct 88 If Danielle wants to purge a drive, wh...wing options will accomplish her goal? A A Correct 89 You’re the lone SSCP in the IT g...the company invest in and make use of? C B Incorrect 90 Which one of the following disaster re...ion of the disaster recovery facility? C C Correct Page: 8 of 9
# Items Correct Answer Your Answer Result 91 Which plan would you expect to be driv...nce), or ALE (annual loss expectancy)? D D Correct 92 Mark is planning a disaster recovery t... What type of test should Mark choose? C C Correct 93 Your boss believes that your company m...might you use to respond to your boss? C C Correct 94 Which statement about phishing attacks is correct? D D Correct 95 In general, what differentiates phishing from whaling attacks? A A Correct 96 Which one of the following metrics spe...storation of service after a disaster? B B Correct 97 Which statement best describes how doe...agers, and leaders in an organization? C C Correct 98 What is the best way to provide accountability for the use of identities? A A Correct 99 George is assisting a prosecutor with ...nce requires George’s testimony? D D Correct 100 What type of alternate processing faci... does not have a current copy of data? B B Correct Page: 9 of 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help