Systems Security Certified Practitioner – SSCP – Question0544

Which of the following backup methods makes a complete backup of every file on the server every time it is run?

A.
full backup method.
B. incremental backup method.
C. differential backup method.
D. tape backup method.

Correct Answer: A

Explanation:

The Full Backup Method makes a complete backup of every file on the server every time it is run.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 69.

Systems Security Certified Practitioner – SSCP – Question0543

Another example of Computer Incident Response Team (CIRT) activities is:

A.
Management of the netware logs, including collection, retention, review, and analysis of data
B. Management of the network logs, including collection and analysis of data
C. Management of the network logs, including review and analysis of data
D. Management of the network logs, including collection, retention, review, and analysis of data

Correct Answer: D

Explanation:

Additional examples of CIRT activities are:
Management of the network logs, including collection, retention, review, and analysis of data Management of the resolution of an incident, management of the remediation of a vulnerability, and post-event reporting to the appropriate parties. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 64.

Systems Security Certified Practitioner – SSCP – Question0542

Which of the following is NOT a correct notation for an IPv6 address?

A.
2001:0db8:0:0:0:0:1428:57ab
B. ABCD:EF01:2345:6789:ABCD:EF01:2345:6789
C. ::1
D. 2001:DB8::8:800::417A

Correct Answer: D

Explanation:

This is not a correct notation for an IPv6 address because the the “::” can only appear once in an address. The use of “::” is a shortcut notation that indicates one or more groups of 16 bits of zeros.
::1 is the loopback address using the special notation Reference: IP Version 6 Addressing Architecture http://tools.ietf.org/html/rfc4291#section-2.1

Systems Security Certified Practitioner – SSCP – Question0541

The IP header contains a protocol field. If this field contains the value of 51, what type of data is contained within the ip datagram?

A.
Transmission Control Protocol (TCP)
B. Authentication Header (AH)
C. User datagram protocol (UDP)
D. Internet Control Message Protocol (ICMP)

Correct Answer: B

Explanation:

TCP has the value of 6 UDP has the value of 17 ICMP has the value of 1
Reference: SANS http://www.sans.org/resources/tcpip.pdf?ref=3871

Systems Security Certified Practitioner – SSCP – Question0540

Which of the following assertions is NOT true about pattern matching and anomaly detection in intrusion detection?

A.
Anomaly detection tends to produce more data
B. A pattern matching IDS can only identify known attacks
C. Stateful matching scans for attack signatures by analyzing individual packets instead of traffic streams
D. An anomaly-based engine develops baselines of normal traffic activity and throughput, and alerts on deviations from these baselines

Correct Answer: C

Explanation:

This is wrong which makes this the correct choice. This statement is not true as stateful matching scans for attack signatures by analyzing traffic streams rather than individual packets. Stateful matching intrusion detection takes pattern matching to the next level.
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detection sensors can barely keep up with bandwidths of a few hundred Mbps. Analysis tools that can deal with higher throughput are unable to maintain state between different steps of an attack or they are limited to the analysis of packet headers.
The following answers are all incorrect:
Anomaly detection tends to produce more data is true as an anomaly-based IDS produces a lot of data as any activity outside of expected behavior is recorded.
A pattern matching IDS can only identify known attacks is true as a pattern matching IDS works by comparing traffic streams against signatures. These signatures are created for known attacks.
An anomaly-based engine develops baselines of normal traffic activity and throughput, and alerts on deviations from these baselines is true as the assertion is a characteristic of a statistical anomaly-based IDS.
Reference: Official guide to the CISSP CBK. Pages 198 to 201 http://cs.ucsb.edu/~vigna/publications/2003_vigna_robertson_kher_ke…

Systems Security Certified Practitioner – SSCP – Question0539

In the course of responding to and handling an incident, you work on determining the root cause of the incident. In which step are you in?

A.
Recovery
B. Containment
C. Triage
D. Analysis and tracking

Correct Answer: D

Explanation:

In this step, your main objective is to examine and analyze what has occurred and focus on determining the root cause of the incident.
Recovery is incorrect as recovery is about resuming operations or bringing affected systems back into production
Containment is incorrect as containment is about reducing the potential impact of an incident.
Triage is incorrect as triage is about determining the seriousness of the incident and filtering out false positives
Reference: Official Guide to the CISSP CBK, pages 700-704

Systems Security Certified Practitioner – SSCP – Question0538

Risk mitigation and risk reduction controls for providing information security are classified within three main categories, which of the following are being used?

A.
preventive, corrective, and administrative
B. detective, corrective, and physical
C. Physical, technical, and administrative
D. Administrative, operational, and logical

Correct Answer: C

Explanation:

Security is generally defined as the freedom from danger or as the condition of safety. Computer security, specifically, is the protection of data in a system against unauthorized disclosure, modification, or destruction and protection of the computer system itself against unauthorized use, modification, or denial of service. Because certain computer security controls inhibit productivity, security is typically a compromise toward which security practitioners, system users, and system operations and administrative personnel work to achieve a satisfactory balance between security and productivity.
Controls for providing information security can be physical, technical, or administrative. These three categories of controls can be further classified as either preventive or detective. Preventive controls attempt to avoid the occurrence of unwanted events, whereas detective controls attempt to identify unwanted events after they have occurred. Preventive controls inhibit the free use of computing resources and therefore can be applied only to the degree that the users are willing to accept. Effective security awareness programs can help increase users’ level of tolerance for preventive controls by helping them understand how such controls enable them to trust their computing systems. Common detective controls include audit trails, intrusion detection methods, and checksums.
Three other types of controls supplement preventive and detective controls. They are usually described as deterrent, corrective, and recovery.
Deterrent controls are intended to discourage individuals from intentionally violating information security policies or procedures. These usually take the form of constraints that make it difficult or undesirable to perform unauthorized activities or threats of consequences that influence a potential intruder to not violate security (e.g., threats ranging from embarrassment to severe punishment). Corrective controls either remedy the circumstances that allowed the unauthorized activity or return conditions to what they were before the violation. Execution of corrective controls could result in changes to existing physical, technical, and administrative controls. Recovery controls restore lost computing resources or capabilities and help the organization recover monetary losses caused by a security violation.
Deterrent, corrective, and recovery controls are considered to be special cases within the major categories of physical, technical, and administrative controls; they do not clearly belong in either preventive or detective categories. For example, it could be argued that deterrence is a form of prevention because it can cause an intruder to turn away; however, deterrence also involves detecting violations, which may be what the intruder fears most. Corrective controls, on the other hand, are not preventive or detective, but they are clearly linked with technical controls when antiviral software eradicates a virus or with administrative controls when backup procedures enable restoring a damaged data base. Finally, recovery controls are neither preventive nor detective but are included in administrative controls as disaster recovery or contingency plans.
Reference(s) used for this question Handbook of Information Security Management, Hal Tipton

Systems Security Certified Practitioner – SSCP – Question0537

What is called the probability that a threat to an information system will materialize?

A.
Threat
B. Risk
C. Vulnerability
D. Hole

Correct Answer: B

Explanation:

The Answer: Risk: The potential for harm or loss to an information system or network; the probability that a threat will materialize. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Pages 16, 32.

Systems Security Certified Practitioner – SSCP – Question0536

A weakness or lack of a safeguard, which may be exploited by a threat, causing harm to the information systems or networks is called a ?

A.
Vulnerability
B. Risk
C. Threat
D. Overflow

Correct Answer: A

Explanation:

The Answer: Vulnerability; Vulnerability is a weakness or lack of a safeguard, which may be exploited by a threat, causing harm to the information systems or networks. Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Pages 16, 32.

Systems Security Certified Practitioner – SSCP – Question0535

What is called an event or activity that has the potential to cause harm to the information systems or networks?

A.
Vulnerability
B. Threat agent
C. Weakness
D. Threat

Correct Answer: D

Explanation:

Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Pages 16, 32.