New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 10 Question 95 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 95
Topic #: 10
[All SSCP Questions]

Out of the steps listed below, which one is not one of the steps conducted during the Business Impact Analysis (BIA)?

Show Suggested Answer Hide Answer
Suggested Answer: C

A trojan horse is any code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it. A Trojan often also includes a trapdoor as a means to gain access to a computer system bypassing security controls.

Wikipedia defines it as:

A Trojan horse, or Trojan, in computing is a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Greece, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.

The following answers are incorrect:

virus. Is incorrect because a Virus is a malicious program and is does not appear to be harmless, it's sole purpose is malicious intent often doing damage to a system. A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be 'infected'.

worm. Is incorrect because a Worm is similiar to a Virus but does not require user intervention to execute. Rather than doing damage to the system, worms tend to self-propagate and devour the resources of a system. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

trapdoor. Is incorrect because a trapdoor is a means to bypass security by hiding an entry point into a system. Trojan Horses often have a trapdoor imbedded in them.

References:

http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29

and

http://en.wikipedia.org/wiki/Computer_virus

and

http://en.wikipedia.org/wiki/Computer_worm

and

http://en.wikipedia.org/wiki/Backdoor_%28computing%29


Contribute your Thoughts:

0/2000 characters
Rueben
3 months ago
Yup, it's all about critical functions and data techniques!
upvoted 0 times
...
Carin
3 months ago
Wait, are we sure about that? Seems off.
upvoted 0 times
...
Katina
3 months ago
I thought selecting interviewees was part of it?
upvoted 0 times
...
Linwood
4 months ago
Totally agree, it's about identifying functions, not sites.
upvoted 0 times
...
Laine
4 months ago
Alternate site selection is not part of BIA.
upvoted 0 times
...
Serita
4 months ago
Identifying critical business functions definitely seems like a core part of BIA, but I can't recall if creating data-gathering techniques is included.
upvoted 0 times
...
Malcolm
4 months ago
Selecting individuals to interview sounds like a step in the BIA process, but I could be mixing it up with other assessments.
upvoted 0 times
...
Leandro
4 months ago
I'm not entirely sure, but I remember something about data-gathering techniques being important for BIA.
upvoted 0 times
...
Eveline
5 months ago
I think the alternate site selection is more related to disaster recovery planning, not BIA.
upvoted 0 times
...
Gilberto
5 months ago
I've got a good handle on the BIA process, so I think I can eliminate the odd one out here. Alternate site selection sounds like it's not part of the core BIA steps.
upvoted 0 times
...
Josphine
5 months ago
I'm a bit confused on this one. The steps all seem related to a BIA, but I'll have to double-check my notes to be sure.
upvoted 0 times
...
Arminda
5 months ago
Hmm, this one's tricky. I'll need to think carefully about the steps involved in a BIA.
upvoted 0 times
...
Thora
5 months ago
Okay, let's see. Alternate site selection seems like it might be a different process, not part of the BIA itself.
upvoted 0 times
...
Lyla
5 months ago
Resynchronizing the relationship sounds like the right move here. I'll make sure to read the question and exhibit carefully before submitting my answer.
upvoted 0 times
...
Serina
9 months ago
I'm confident the answer is A) Alternate site selection. The BIA is like a business health check, not a real estate hunt.
upvoted 0 times
...
Vivienne
10 months ago
Easy peasy, it's gotta be A) Alternate site selection. The BIA is about understanding the business, not finding backup locations. Unless, of course, the business is a circus, then alternate site selection would be top priority!
upvoted 0 times
Francesco
9 months ago
Alternate site selection would be more relevant for the Business Continuity Planning phase.
upvoted 0 times
...
Ressie
9 months ago
Definitely, the focus is on identifying critical business functions and gathering data.
upvoted 0 times
...
Cherilyn
9 months ago
I think you're right, A) Alternate site selection is not part of the BIA process.
upvoted 0 times
...
...
Mary
10 months ago
Hmm, I'm leaning towards D) Select individuals to interview for data gathering. That seems like a key step in the BIA process to me.
upvoted 0 times
Brunilda
9 months ago
Oh, I see. Thanks for clarifying. I'll keep that in mind for future reference.
upvoted 0 times
...
Fabiola
9 months ago
No, that's not correct. The step that is not conducted during the BIA is A) Alternate site selection.
upvoted 0 times
...
Beata
9 months ago
I think D) Select individuals to interview for data gathering is actually part of the BIA process.
upvoted 0 times
...
...
Buck
10 months ago
I'm pretty sure it's B) Create data-gathering techniques. The BIA is all about gathering and analyzing data, not creating the techniques themselves.
upvoted 0 times
Jolene
8 months ago
D) Select individuals to interview for data gathering
upvoted 0 times
...
Nana
9 months ago
C) Identify the company's critical business functions
upvoted 0 times
...
Melinda
9 months ago
A) Alternate site selection
upvoted 0 times
...
...
Chauncey
10 months ago
I think the correct answer is A) Alternate site selection. The BIA focuses on identifying critical business functions and their requirements, not selecting alternate sites.
upvoted 0 times
Corrina
9 months ago
Exactly, it's important to have a separate plan for that.
upvoted 0 times
...
Isabella
9 months ago
Alternate site selection is usually part of the Business Continuity Planning process.
upvoted 0 times
...
Celeste
9 months ago
Yes, the main focus is on understanding the impact of disruptions on those functions.
upvoted 0 times
...
Ciara
9 months ago
I agree, the BIA is more about identifying critical business functions.
upvoted 0 times
...
...
Myrtie
11 months ago
I see your point, but I still think it's A) Alternate site selection because it's not directly related to the BIA process.
upvoted 0 times
...
Derrick
11 months ago
I disagree, I believe the answer is B) Create data-gathering techniques.
upvoted 0 times
...
Myrtie
11 months ago
I think the answer is A) Alternate site selection.
upvoted 0 times
...

Save Cancel