Book Image

SSCP Systems Security Certified Practitioner Official Practice Tests

By : Mike Chapple, David Seidl
Book Image

SSCP Systems Security Certified Practitioner Official Practice Tests

By: Mike Chapple, David Seidl

Overview of this book

The SSCP certification is offered by the International Information System Security Certification Consortium (ISC)2. The SSCP is the entry-level credential in this series. With SSCP certification, you’ll meet the requirements of the Department of Defense for entry-level Information Assurance Technical (IAT I) roles, positioning you for a successful career in cybersecurity. This book's first seven chapters cover each of the seven domains on the SSCP exam with sixty or more questions per domain, so you can focus your study efforts exactly where you need more review. The book also contains two complete practice exams that you can use as time trials to assess your readiness for the SSCP and a future in the field of information assurance. By the end of the book, you would have strengthened your weak areas and reinforced your learning to ace the test and earn the certification.
Table of Contents (14 chapters)
2
Chapter 1 Access Controls (Domain 1)
3
Chapter 2 Security Operations and Administration (Domain 2)
4
Chapter 3 Risk Identification, Monitoring, and Analysis (Domain 3)
5
Chapter 4 Incident Response and Recovery (Domain 4)
6
Chapter 5 Cryptography (Domain 5)
7
Chapter 6 Network and Communications Security (Domain 6)
8
Chapter 7 Systems and Application Security (Domain 7)
9
Chapter 8 Practice Test 1
10
Chapter 9 Practice Test 2
11
Index
12
Advert
13
End User License Agreement

Chapter 4: Incident Response and Recovery (Domain 4)

  1. C. Tara’s highest priority should be containing the damage to prevent the spread of the incident to other systems and networks. She has already detected the incident, so detection is not a priority. Eradication and recovery should occur only after the incident has been contained.

  2. C. Alan should request that the organization provide him with a securely generated hash value that was created when the evidence was originally collected. Alan can then compare the hash value of the current drive contents with that value to verify that the evidence was not altered.

  3. C. Photo metadata commonly includes the GPS location, the type of camera used to capture the photo, and the timestamp when the photo was taken. It does not include the number of times that the file was copied.

  4. D. John the Ripper is a password cracking tool. Using it on a Linux system requires copies of both the /etc/passwd and /etc/shadow files.

  5. C. NIST...