Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

SSCP ISC Systems Security Certified Practitioner Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC SSCP Systems Security Certified Practitioner certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 7
Total 1074 questions

How is Annualized Loss Expectancy (ALE) derived from a threat?

A.

ARO x (SLE - EF)

B.

SLE x ARO

C.

SLE/EF

D.

AV x EF

Which of the following cannot be undertaken in conjunction or while computer incident handling is ongoing?

A.

System development activity

B.

Help-desk function

C.

System Imaging

D.

Risk management process

Under United States law, an investigator's notebook may be used in court in which of the following scenarios?

A.

When the investigator is unwilling to testify.

B.

When other forms of physical evidence are not available.

C.

To refresh the investigators memory while testifying.

D.

If the defense has no objections.

During the testing of the business continuity plan (BCP), which of the following methods of results analysis provides the BEST assurance that the plan is workable?

A.

Measurement of accuracy

B.

Elapsed time for completion of critical tasks

C.

Quantitatively measuring the results of the test

D.

Evaluation of the observed test results

Out of the steps listed below, which one is not one of the steps conducted during the Business Impact Analysis (BIA)?

A.

Alternate site selection

B.

Create data-gathering techniques

C.

Identify the company’s critical business functions

D.

Select individuals to interview for data gathering

In the course of responding to and handling an incident, you work on determining the root cause of the incident. In which step are you in?

A.

Recovery

B.

Containment

C.

Triage

D.

Analysis and tracking

Which backup method is used if backup time is critical and tape space is at an extreme premium?

A.

Incremental backup method.

B.

Differential backup method.

C.

Full backup method.

D.

Tape backup method.

Valuable paper insurance coverage does not cover damage to which of the following?

A.

Inscribed, printed and Written documents

B.

Manuscripts

C.

Records

D.

Money and Securities

In which of the following phases of system development life cycle (SDLC) is contingency planning most important?

A.

Initiation

B.

Development/acquisition

C.

Implementation

D.

Operation/maintenance

Which of the following best defines a Computer Security Incident Response Team (CSIRT)?

A.

An organization that provides a secure channel for receiving reports about suspected security incidents.

B.

An organization that ensures that security incidents are reported to the authorities.

C.

An organization that coordinates and supports the response to security incidents.

D.

An organization that disseminates incident-related information to its constituency and other involved parties.

Which of the following computer recovery sites is only partially equipped with processing equipment?

A.

hot site

B.

rolling hot site

C.

warm site

D.

cold site

A contingency plan should address:

A.

Potential risks.

B.

Residual risks.

C.

Identified risks.

D.

All answers are correct.

The typical computer fraudsters are usually persons with which of the following characteristics?

A.

They have had previous contact with law enforcement

B.

They conspire with others

C.

They hold a position of trust

D.

They deviate from the accepted norms of society

What is the MOST critical piece to disaster recovery and continuity planning?

A.

Security policy

B.

Management support

C.

Availability of backup information processing facilities

D.

Staff training

To protect and/or restore lost, corrupted, or deleted information, thereby preserving the data integrity and availability is the purpose of:

A.

Remote journaling.

B.

Database shadowing.

C.

A tape backup method.

D.

Mirroring.

Which of the following statements pertaining to quantitative risk analysis is false?

A.

Portion of it can be automated

B.

It involves complex calculations

C.

It requires a high volume of information

D.

It requires little experience to apply

Which disaster recovery plan test involves functional representatives meeting to review the plan in detail?

A.

Simulation test

B.

Checklist test

C.

Parallel test

D.

Structured walk-through test

All of the following can be considered essential business functions that should be identified when creating a Business Impact Analysis (BIA) except one. Which of the following would not be considered an essential element of the BIA but an important TOPIC to include within the BCP plan:

A.

IT Network Support

B.

Accounting

C.

Public Relations

D.

Purchasing

Which of the following steps is NOT one of the eight detailed steps of a Business Impact Assessment (BIA):

A.

Notifying senior management of the start of the assessment.

B.

Creating data gathering techniques.

C.

Identifying critical business functions.

D.

Calculating the risk for each different business function.

What can be best defined as the examination of threat sources against system vulnerabilities to determine the threats for a particular system in a particular operational environment?

A.

Risk management

B.

Risk analysis

C.

Threat analysis

D.

Due diligence

Which of the following server contingency solutions offers the highest availability?

A.

System backups

B.

Electronic vaulting/remote journaling

C.

Redundant arrays of independent disks (RAID)

D.

Load balancing/disk replication

Which of the following is NOT a part of a risk analysis?

A.

Identify risks

B.

Quantify the impact of potential threats

C.

Provide an economic balance between the impact of the risk and the cost of the associated countermeasure

D.

Choose the best countermeasure

Computer security should be first and foremost which of the following:

A.

Cover all identified risks

B.

Be cost-effective.

C.

Be examined in both monetary and non-monetary terms.

D.

Be proportionate to the value of IT systems.

Which of the following specifically addresses cyber attacks against an organization's IT systems?

A.

Continuity of support plan

B.

Business continuity plan

C.

Incident response plan

D.

Continuity of operations plan

Which of the following is an example of an active attack?

A.

Traffic analysis

B.

Scanning

C.

Eavesdropping

D.

Wiretapping

Which of the following backup methods is primarily run when time and tape space permits, and is used for the system archive or baselined tape sets?

A.

full backup method.

B.

incremental backup method.

C.

differential backup method.

D.

tape backup method.

What is called an event or activity that has the potential to cause harm to the information systems or networks?

A.

Vulnerability

B.

Threat agent

C.

Weakness

D.

Threat

Which of the following proves or disproves a specific act through oral testimony based on information gathered through the witness's five senses?

A.

Direct evidence.

B.

Circumstantial evidence.

C.

Conclusive evidence.

D.

Corroborative evidence.

What can be defined as a momentary low voltage?

A.

Spike

B.

Sag

C.

Fault

D.

Brownout

Physically securing backup tapes from unauthorized access is obviously a security concern and is considered a function of the:

A.

Operations Security Domain.

B.

Operations Security Domain Analysis.

C.

Telecommunications and Network Security Domain.

D.

Business Continuity Planning and Disater Recovery Planning.

The scope and focus of the Business continuity plan development depends most on:

A.

Directives of Senior Management

B.

Business Impact Analysis (BIA)

C.

Scope and Plan Initiation

D.

Skills of BCP committee

Which of the following is the most complete disaster recovery plan test type, to be performed after successfully completing the Parallel test?

A.

Full Interruption test

B.

Checklist test

C.

Simulation test

D.

Structured walk-through test

Which of the following best describes remote journaling?

A.

Send hourly tapes containing transactions off-site.

B.

Send daily tapes containing transactions off-site.

C.

Real-time capture of transactions to multiple storage devices.

D.

Real time transmission of copies of the entries in the journal of transactions to an alternate site.

Which backup method usually resets the archive bit on the files after they have been backed up?

A.

Incremental backup method.

B.

Differential backup method.

C.

Partial backup method.

D.

Tape backup method.

How often should tests and disaster recovery drills be performed?

A.

At least once a quarter

B.

At least once every 6 months

C.

At least once a year

D.

At least once every 2 years

Which of the following outlined how senior management are responsible for the computer and information security decisions that they make and what actually took place within their organizations?

A.

The Computer Security Act of 1987.

B.

The Federal Sentencing Guidelines of 1991.

C.

The Economic Espionage Act of 1996.

D.

The Computer Fraud and Abuse Act of 1986.

Hierarchical Storage Management (HSM) is commonly employed in:

A.

very large data retrieval systems

B.

very small data retrieval systems

C.

shorter data retrieval systems

D.

most data retrieval systems

Which of the following is less likely to accompany a contingency plan, either within the plan itself or in the form of an appendix?

A.

Contact information for all personnel.

B.

Vendor contact information, including offsite storage and alternate site.

C.

Equipment and system requirements lists of the hardware, software, firmware and other resources required to support system operations.

D.

The Business Impact Analysis.

Business Continuity Planning (BCP) is not defined as a preparation that facilitates:

A.

the rapid recovery of mission-critical business operations

B.

the continuation of critical business functions

C.

the monitoring of threat activity for adjustment of technical controls

D.

the reduction of the impact of a disaster

What does "residual risk" mean?

A.

The security risk that remains after controls have been implemented

B.

Weakness of an assets which can be exploited by a threat

C.

Risk that remains after risk assessment has has been performed

D.

A security risk intrinsic to an asset being audited, where no mitigation has taken place.

Page: 1 / 7
Total 1074 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved