New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 6 Question 88 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 88
Topic #: 6
[All SSCP Questions]

The preliminary steps to security planning include all of the following EXCEPT which of the following?

Show Suggested Answer Hide Answer
Suggested Answer: C

A trojan horse is any code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it. A Trojan often also includes a trapdoor as a means to gain access to a computer system bypassing security controls.

Wikipedia defines it as:

A Trojan horse, or Trojan, in computing is a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. The term is derived from the story of the wooden horse used to trick defenders of Troy into taking concealed warriors into their city in ancient Greece, because computer Trojans often employ a form of social engineering, presenting themselves as routine, useful, or interesting in order to persuade victims to install them on their computers.

The following answers are incorrect:

virus. Is incorrect because a Virus is a malicious program and is does not appear to be harmless, it's sole purpose is malicious intent often doing damage to a system. A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be 'infected'.

worm. Is incorrect because a Worm is similiar to a Virus but does not require user intervention to execute. Rather than doing damage to the system, worms tend to self-propagate and devour the resources of a system. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

trapdoor. Is incorrect because a trapdoor is a means to bypass security by hiding an entry point into a system. Trojan Horses often have a trapdoor imbedded in them.

References:

http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29

and

http://en.wikipedia.org/wiki/Computer_virus

and

http://en.wikipedia.org/wiki/Computer_worm

and

http://en.wikipedia.org/wiki/Backdoor_%28computing%29


Contribute your Thoughts:

0/2000 characters
Alaine
3 months ago
I thought audits were part of the initial planning, this is confusing!
upvoted 0 times
...
Iola
3 months ago
Listing planning assumptions is key, but I think the audit comes later.
upvoted 0 times
...
Alaine
3 months ago
Wait, are we sure about that? Seems important to me!
upvoted 0 times
...
Chau
4 months ago
Totally agree, it's more of a later stage task.
upvoted 0 times
...
Ena
4 months ago
Establish a security audit function isn't a preliminary step.
upvoted 0 times
...
Talia
4 months ago
Establishing objectives definitely sounds like a foundational step, but I wonder if the audit function is really necessary at the start.
upvoted 0 times
...
Mignon
4 months ago
I'm not entirely sure about determining alternate courses of action. It seems important, but I can't recall if it's part of the initial steps.
upvoted 0 times
...
Danica
4 months ago
I remember a practice question where we had to list planning assumptions, so that one feels like a definite step.
upvoted 0 times
...
Annett
5 months ago
I think establishing a security audit function might not be a preliminary step. It seems more like something you'd do after planning.
upvoted 0 times
...
Kattie
5 months ago
I'm a little confused by this question. The options all seem relevant to security planning, but I know there must be one that is not a preliminary step. I'll have to read through it again and see if I can spot the odd one out.
upvoted 0 times
...
Louvenia
5 months ago
Okay, I've got this. The key is to identify the step that is not part of the preliminary security planning process. I'm pretty confident I can eliminate the wrong answer here.
upvoted 0 times
...
Venita
5 months ago
This looks like a straightforward security planning question. I'll need to carefully read through the options and think about which step is not part of the preliminary process.
upvoted 0 times
...
Portia
5 months ago
Hmm, I'm a bit unsure about this one. Establishing objectives, listing assumptions, and determining alternate courses of action all seem like important preliminary steps. I'll have to think this through carefully.
upvoted 0 times
...
Staci
5 months ago
I've got a good strategy for this. I'll read through the answer choices first, then closely examine the boot environment information to determine which ones are correct. Gotta be thorough on these exam questions.
upvoted 0 times
...
Glory
5 months ago
I'm not sure if Trevor is really a laggard either. He did wait, but maybe he just prefers to see how things pan out before committing?
upvoted 0 times
...
Willodean
5 months ago
Hmm, this one seems a bit tricky. I'll need to carefully read through the options and think about the right configuration mode to use.
upvoted 0 times
...
Chandra
9 months ago
Hmm, D is the only one that doesn't sound like a standard preliminary step. Time to put on my security planning hat and choose wisely!
upvoted 0 times
...
Delsie
9 months ago
Ah, the age-old security planning question. I bet D is the one they don't want us to pick. Gotta love these tricky exam questions!
upvoted 0 times
...
Adaline
9 months ago
D seems like the odd one out here. The other options are classic first steps in any security planning process.
upvoted 0 times
Loreta
8 months ago
Agreed, D is definitely the odd one out. It's more of a later step in the process.
upvoted 0 times
...
Fatima
8 months ago
D does seem out of place. It's not typically a preliminary step in security planning.
upvoted 0 times
...
Frederick
8 months ago
C) Establish a security audit function.
upvoted 0 times
...
Kristeen
9 months ago
B) List planning assumptions.
upvoted 0 times
...
Helene
9 months ago
A) Establish objectives.
upvoted 0 times
...
...
Reed
9 months ago
I'm pretty sure the correct answer is D. Establishing objectives, listing planning assumptions, and setting up a security audit function are all important preliminary steps.
upvoted 0 times
Antione
8 months ago
Setting up a security audit function is also important.
upvoted 0 times
...
Tien
8 months ago
Establishing objectives is crucial for security planning.
upvoted 0 times
...
Anissa
8 months ago
I agree, D is the correct answer.
upvoted 0 times
...
...
Kanisha
10 months ago
I think the answer is D. Determining alternate courses of action is not a preliminary step in security planning.
upvoted 0 times
Wynell
9 months ago
C) Establish a security audit function.
upvoted 0 times
...
Bong
10 months ago
B) List planning assumptions.
upvoted 0 times
...
Shenika
10 months ago
A) Establish objectives.
upvoted 0 times
...
...
Maira
11 months ago
Hmm, you might be right. It does make sense to have alternate courses of action in security planning.
upvoted 0 times
...
Oren
11 months ago
I disagree, I believe the answer is D) Determine alternate courses of action.
upvoted 0 times
...
Maira
11 months ago
I think the answer is C) Establish a security audit function.
upvoted 0 times
...

Save Cancel