Act now and download your ISC2 SSCP test today! Do not waste time for the worthless ISC2 SSCP tutorials. Download Far out ISC2 System Security Certified Practitioner (SSCP) exam with real questions and answers and begin to learn ISC2 SSCP with a classic professional.

2021 Sep SSCP practice exam

Q11. MD5 is a ___________ algorithm 

A. One way hash 

B. 3DES 

C. 192 bit 

D. PKI 

Answer: A 


Q12. EDI (Electronic Data Interchange) differs from e-Commerce in that ___________________. 

A. EDI involves only computer to computer transactions 

B. E-Commerce involves only computer to computer transactions 

C. EDI allows companies to take credit cards directly to consumers via the web 

D. None of the items listed accurately reflect the differences between EDI and e-Commerce 

Answer: A 


Q13. Vulnerability x Threat = RISK is an example of the _______________. 

A. Disaster Recovery Equation 

B. Threat Assessment 

C. Risk Equation 

D. Calculation of Annual Loss Expectancy 

Answer: C 


Q14. What is the main difference between computer abuse and computer crime? 

A. Amount of damage 

B. Intentions of the perpetrator 

C. Method of compromise 

D. Abuse = company insider; crime = company outsider 

Answer: B 


Q15. Sending an ICMP packet greater than 64Kb is an example of what type of attack? 

A. Buffer Overflow 

B. Ping of Death 

C. Syn Flooding 

D. TearDrop 

E. Land Attack 

Answer: B 


SSCP exam fees

Abreast of the times SSCP free practice exam:

Q16. What is a big difference between Java Applets and Active X controls? 

A. Active X controls can run on any platform 

B. Java Applets only run in Windows 

C. Java Applets have access to the full Windows OS 

D. Active X controls have access to the full Windows OS 

Answer: D 


Q17. ORRECT TEXT 

________ attacks generally prevent valid authorized users from gaining access to system resources. 

A. Denial of Service

Answer: A


Q18. What are some of the major differences of Qualitative vs. Quantitative methods of performing risk analysis? (Choose all that apply) 

A. Quantitative analysis uses numeric values 

B. Qualitative analysis uses numeric values 

C. Quantitative analysis is more time consuming 

D. Qualitative analysis is more time consuming 

E. Quantitative analysis is based on Annualized Loss Expectancy (ALE) formulas 

F. Qualitative analysis is based on Annualized Loss Expectancy (ALE) formulas 

Answer: ACE 


Q19. The standard of __________ states that a certain level of integrity and information protection levels will be maintained. 

A. Due Diligence 

B. Due Process 

C. Due Care 

D. BSO 1799 

Answer: C 


Q20. _____________ states that users should only be given enough access to accomplish their jobs. 

A. Separation of Duties 

B. Due Diligence 

C. Concept of Least Privilege 

D. All of the listed items are correct 

Answer: C