Systems-Security-Certified-Practioner-(SSCP).pdf - ISC2...

This preview shows page 1 - 4 out of 8 pages.

The preview shows page 2 - 4 out of 8 pages.
SSCPISC2Systems Security Certified Practioner
A Black Hat is someone who uses his skills for offensive purpose. They do not seekauthorization before they attempt to comprise the security mechanisms in place."Grey Hats" are people who sometimes work as a White hat and other times they willwork as a "Black Hat", they have not made up their mind yet as to which side theyprefer to be.The following are incorrect answers:All the other choices could be possible reasons but the best one today is really forfinancial gains.References used for this question:andand-06938FE8BB53%7Dhtcb006.pdfQUESTION:371What best describes a scenario when an employee has been shaving off pennies frommultiple accounts and depositing the funds into his own bank account?C
Explanation:Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2001, Page 644.QUESTION:372Java is not:C
Explanation:JAVA was developed so that the same program could be executed on multiplehardware and operating system platforms, it is not Architecture Specific.The following answers are incorrect:
Object-oriented. Is not correct because JAVA is object-oriented. It should use theobject- oriented programming methodology.Distributed. Is incorrect because JAVA was developed to be able to be distrubuted,run on multiple computer systems over a network.Multithreaded. Is incorrect because JAVA is multi-threaded that is calls tosubroutines as is the case with object-oriented programming.A virus is a program that can replicate itself on a system but not necessarily spreaditself by network connections.QUESTION:373What is malware that can spread itself over open network connections?A

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 8 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Computer Security, Computer virus, Rootkit, Computer worm

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture