Exam information

Exam SSCP: Systems Security Certified Practitioner (update May 17th, 2014)

Other exams

DES – Data Encryption standard has a 128 bit key and is very difficult to break.

DES – Data Encryption standard has a 128 bit key and is very difficult to break.

What is the main difference between computer abuse and computer crime?

What is the main difference between computer abuse and computer crime?


A standardized list of the most common security weaknesses and exploits is the __________.

A standardized list of the most common security weaknesses and exploits is the __________.

what type of activity?

A salami attack refers to what type of activity?

which functions?

Multi-partite viruses perform which functions?

What security principle is based on the division of job responsibilities – designed to prevent fraud?

What security principle is based on the division of job responsibilities – designed to prevent fraud?

________ is the authoritative entity which lists port assignments

________ is the authoritative entity which lists port assignments

Cable modems are less secure than DSL connections because cable modems are shared with other subscribers?

Cable modems are less secure than DSL connections because cable modems are shared withother subscribers?

____________ is a file system that was poorly designed and has numerous security flaws.

____________ is a file system that was poorly designed and has numerous security flaws.

CORRECT TEXT Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.

CORRECT TEXTTrend Analysis involves analyzing historical ___________ files in order to look for patterns ofabuse or misuse.

Page 1 of 2612345...1020...Last »