New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 1 Question 54 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 54
Topic #: 1
[All SSCP Questions]

Which virus category has the capability of changing its own code, making it harder to detect by anti-virus software?

Show Suggested Answer Hide Answer
Suggested Answer: B

A polymorphic virus has the capability of changing its own code, enabling it to have many different variants, making it harder to detect by anti-virus software. The particularity of a stealth virus is that it tries to hide its presence after infecting a system. A Trojan horse is a set of unauthorized instructions that are added to or replacing a legitimate program. A logic bomb is a set of instructions that is initiated when a specific event occurs.

Source: HARRIS, Shon, All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 2002, chapter 11: Application and System Development (page 786).


Contribute your Thoughts:

0/2000 characters
Phuong
4 months ago
Logic bombs are cool, but they don't change like polymorphic ones.
upvoted 0 times
...
Johnetta
4 months ago
Really? I didn't know viruses could do that. Sounds wild!
upvoted 0 times
...
Allene
4 months ago
No way, it's B for sure. They change their code all the time.
upvoted 0 times
...
Dick
4 months ago
I thought it was A, stealth viruses are sneaky too.
upvoted 0 times
...
Beckie
4 months ago
Definitely B, polymorphic viruses are tricky!
upvoted 0 times
...
Gracie
5 months ago
Logic bombs and Trojan horses don't really change their code, do they? I'm leaning towards polymorphic as well, but I hope I'm not mixing things up.
upvoted 0 times
...
Phil
5 months ago
I recall a practice question about virus types, and I think polymorphic was the answer there too. It makes sense for this question.
upvoted 0 times
...
Linn
5 months ago
I'm not entirely sure, but I feel like stealth viruses might also have some ability to hide. Did we cover that in class?
upvoted 0 times
...
Rikki
5 months ago
I think it's polymorphic viruses that change their code, right? I remember studying that they can evade detection.
upvoted 0 times
...
Stephaine
5 months ago
Okay, let me see if I can break this down. We're looking for an attack that tries to find data by modifying the SQL query, right? I'm pretty sure that's an inference attack, so I'm going to go with B.
upvoted 0 times
...
Suzi
5 months ago
Ah, I remember learning about semantic versioning in one of my classes. Okay, got it! Since the new version has new features but is still backward compatible, the major version should stay at 1, and the minor version should increment. So I'm going to go with option D - 1.2.0.
upvoted 0 times
...
Owen
5 months ago
Okay, let's think this through step-by-step. A network diagram is used to represent the connections and relationships between different elements, like devices or systems. A flow chart seems like a logical choice, as it can show the flow of information or processes within a network. I'll go with option A.
upvoted 0 times
...
Laura
5 months ago
I remember a question like this where living arrangements influenced the number of exemptions. Does it affect Ruth since she's not living with him?
upvoted 0 times
...
Cory
5 months ago
This looks like a straightforward CSS question. I'm pretty confident I know the answer - it's Cascading Style Sheet.
upvoted 0 times
...
Lillian
5 months ago
The key here is to focus on the architectures that are most likely to use virtualization. That narrows it down to the multi-tier, distributed, and cloud-based systems.
upvoted 0 times
...

Save Cancel