Systems Security Certified Practitioner
Last Update May 5, 2024
Total Questions : 1074
We are offering FREE SSCP ISC exam questions. All you do is to just go and sign up. Give your details, prepare SSCP free exam questions and then go for complete pool of Systems Security Certified Practitioner test questions that will help you more.
In which phase of Internet Key Exchange (IKE) protocol is peer authentication performed?
Complete the blanks. When using PKI, I digitally sign a message using my ______ key. The recipient verifies my signature using my ______ key.
Which of the following is NOT a property of the Rijndael block cipher algorithm?
Which of the following BEST describes a function relying on a shared secret key that is used along with a hashing algorithm to verify the integrity of the communication content as well as the sender?
In a known plaintext attack, the cryptanalyst has knowledge of which of the following?
Which backup method only copies files that have been recently added or changed and also leaves the archive bit unchanged?
Business Continuity Planning (BCP) is not defined as a preparation that facilitates:
Which of the following is NOT a common category/classification of threat to an IT system?
Which of the following questions is less likely to help in assessing an organization's contingency planning controls?
Which of the following can be best defined as computing techniques for inseparably embedding unobtrusive marks or labels as bits in digital data and for detecting or extracting the marks later?
What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?
This type of attack is generally most applicable to public-key cryptosystems, what type of attack am I ?
What is the key size of the International Data Encryption Algorithm (IDEA)?
Which of the following statements pertaining to key management is incorrect?
Which of the following access control models introduces user security clearance and data classification?
An alternative to using passwords for authentication in logical or technical access control is:
Which of the following technologies has been developed to support TCP/IP networking over low-speed serial interfaces?
Which of the following is most appropriate to notify an external user that session monitoring is being conducted?
Which of the following protocol was used by the INITIAL version of the Terminal Access Controller Access Control System TACACS for communication between clients and servers?
In addition to the accuracy of the biometric systems, there are other factors that must also be considered:
Which of the following is used by RADIUS for communication between clients and servers?
Which of the following technologies is a target of XSS or CSS (Cross-Site Scripting) attacks?
Which virus category has the capability of changing its own code, making it harder to detect by anti-virus software?
Which of the following virus types changes some of its characteristics as it spreads?
Which of the following computer crime is MORE often associated with INSIDERS?
The high availability of multiple all-inclusive, easy-to-use hacking tools that do NOT require much technical knowledge has brought a growth in the number of which type of attackers?
Virus scanning and content inspection of SMIME encrypted e-mail without doing any further processing is:
In computing what is the name of a non-self-replicating type of malware program containing malicious code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it, when executed, carries out actions that are unknown to the person installing it, typically causing loss or theft of data, and possible system harm.
A security evaluation report and an accreditation statement are produced in which of the following phases of the system development life cycle?
Which of the following describes a computer processing architecture in which a language compiler or pre-processor breaks program instructions down into basic operations that can be performed by the processor at the same time?
Which of the following choice is NOT normally part of the questions that would be asked in regards to an organization's information security policy?
Which of the following embodies all the detailed actions that personnel are required to follow?
Related to information security, confidentiality is the opposite of which of the following?
Memory management in TCSEC levels B3 and A1 operating systems may utilize "data hiding". What does this mean?
Which must bear the primary responsibility for determining the level of protection needed for information systems resources?
What can best be defined as high-level statements, beliefs, goals and objectives?
Which OSI/ISO layer is responsible for determining the best route for data to be transferred?
What ISO/OSI layer do switches primarily operate at?
Do take note that this question makes reference to a plain vanilla switch and not one of the smart switches that is available on the market today.
In this type of attack, the intruder re-routes data traffic from a network device to a personal machine. This diversion allows an attacker to gain access to critical resources and user credentials, such as passwords, and to gain unauthorized access to critical systems of an organization. Pick the best choice below.
Upon which of the following ISO/OSI layers does network address translation operate?
What is the proper term to refer to a single unit of Ethernet data at the link layer of the DoD TCP model ?
Related to information security, availability is the opposite of which of the following?
The Orange Book states that "Hardware and software features shall be provided that can be used to periodically validate the correct operation of the on-site hardware and firmware elements of the TCB [Trusted Computing Base]." This statement is the formal requirement for:
Which of the following is considered the weakest link in a security system?
Which of the following is a set of data processing elements that increases the performance in a computer by overlapping the steps of different instructions?
Which of the following would be the best criterion to consider in determining the classification of an information asset?
The major objective of system configuration management is which of the following?
It is a violation of the "separation of duties" principle when which of the following individuals access the software on systems implementing security?
The security of a computer application is most effective and economical in which of the following cases?
Which of the following is not one of the three goals of Integrity addressed by the Clark-Wilson model?
Which of the following is an IDS that acquires data and defines a "normal" usage profile for the network or host?
Attributes that characterize an attack are stored for reference using which of the following Intrusion Detection System (IDS) ?
Which of the following are the two MOST common implementations of Intrusion Detection Systems?
In what way can violation clipping levels assist in violation tracking and analysis?
Which of the following is NOT a characteristic of a host-based intrusion detection system?
In order to enable users to perform tasks and duties without having to go through extra steps it is important that the security controls and mechanisms that are in place have a degree of?
Which of the following questions are least likely to help in assessing controls covering audit trails?
The fact that a network-based IDS reviews packets payload and headers enable which of the following?
Which of the following is most likely to be useful in detecting intrusions?
Which one of the following statements about the advantages and disadvantages of network-based Intrusion detection systems is true
Which of the following is an issue with signature-based intrusion detection systems?
Which of the following statements pertaining to ethical hacking is incorrect?
Which of the following would assist the most in Host Based intrusion detection?
Which of the following is used to monitor network traffic or to monitor host audit logs in real time to determine violations of system security policy that have taken place?
A copy of evidence or oral description of its contents; which is not as reliable as best evidence is what type of evidence?
Which one of the following is NOT one of the outcomes of a vulnerability assessment?
Which of the following is the best reason for the use of an automated risk analysis tool?
In the course of responding to and handling an incident, you work on determining the root cause of the incident. In which step are you in?
Which of the following statements pertaining to a Criticality Survey is incorrect?
For which areas of the enterprise are business continuity plans required?
Which of the following backup sites is the most effective for disaster recovery?
Which backup method does not reset the archive bit on files that are backed up?
If an employee's computer has been used by a fraudulent employee to commit a crime, the hard disk may be seized as evidence and once the investigation is complete it would follow the normal steps of the Evidence Life Cycle. In such case, the Evidence life cycle would not include which of the following steps listed below?
Which of the following cannot be undertaken in conjunction or while computer incident handling is ongoing?
Which of the following backup methods is most appropriate for off-site archiving?
When a possible intrusion into your organization's information system has been detected, which of the following actions should be performed first?
Which of the following specifically addresses cyber attacks against an organization's IT systems?
Which of the following best allows risk management results to be used knowledgeably?
The criteria for evaluating the legal requirements for implementing safeguards is to evaluate the cost (C) of instituting the protection versus the estimated loss (L) resulting from the exploitation of the corresponding vulnerability. Therefore, a legal liability may exists when:
Which of the following is the most important consideration in locating an alternate computing facility during the development of a disaster recovery plan?
Which of the following is an IP address that is private (i.e. reserved for internal networks, and not a valid address to use on the Internet)?
Unshielded Twisted Pair (UTP) cables comes in several categories. The categories are based on:
Which of the following protocols is not implemented at the Internet layer of the TCP/IP protocol model?
Which of the following devices enables more than one signal to be sent out simultaneously over one physical circuit?
The IP header contains a protocol field. If this field contains the value of 17, what type of data is contained within the ip datagram?
Which of the following is a token-passing scheme like token ring that also has a second ring that remains dormant until an error condition is detected on the primary ring?
Which of the following remote access authentication systems is the most robust?
In order to ensure the privacy and integrity of the data, connections between firewalls over public networks should use:
Which of the following protocols that provide integrity and authentication for IPSec, can also provide non-repudiation in IPSec?
The Data Encryption Standard (DES) encryption algorithm has which of the following characteristics?
Which of the following identifies the encryption algorithm selected by NIST for the new Advanced Encryption Standard?
What is the name of the third party authority that vouches for the binding between the data items in a digital certificate?
Which of the following statements pertaining to Secure Sockets Layer (SSL) is false?
Which of the following is less likely to be used today in creating a Virtual Private Network?