Vcehome > ISC > ISC Certification > SSCP > SSCP Online Practice Questions and Answers

SSCP Online Practice Questions and Answers

Questions 4

Controlling access to information systems and associated networks is necessary for the preservation of their:

A. Authenticity, confidentiality and availability

B. Confidentiality, integrity, and availability.

C. integrity and availability.

D. authenticity,confidentiality, integrity and availability.

Browse 1074 Q&As
Questions 5

Which of the following statements pertaining to using Kerberos without any extension is false?

A. A client can be impersonated by password-guessing.

B. Kerberos is mostly a third-party authentication protocol.

C. Kerberos uses public key cryptography.

D. Kerberos provides robust authentication.

Browse 1074 Q&As
Questions 6

Whose role is it to assign classification level to information?

A. Security Administrator

B. User

C. Owner

D. Auditor

Browse 1074 Q&As
Questions 7

Devices that supply power when the commercial utility power system fails are called which of the following?

A. power conditioners

B. uninterruptible power supplies

C. power filters

D. power dividers

Browse 1074 Q&As
Questions 8

Which backup method only copies files that have been recently added or changed and also leaves the archive bit unchanged?

A. Full backup method

B. Incremental backup method

C. Fast backup method

D. Differential backup method

Browse 1074 Q&As
Questions 9

Which of the following is NOT a common category/classification of threat to an IT system?

A. Human

B. Natural

C. Technological

D. Hackers

Browse 1074 Q&As
Questions 10

PGP uses which of the following to encrypt data?

A. An asymmetric encryption algorithm

B. A symmetric encryption algorithm

C. A symmetric key distribution system

D. An X.509 digital certificate

Browse 1074 Q&As
Questions 11

What algorithm has been selected as the AES algorithm, replacing the DES algorithm?

A. RC6

B. Twofish

C. Rijndael

D. Blowfish

Browse 1074 Q&As
Questions 12

Which of the following security-focused protocols has confidentiality services operating at a layer different from the others?

A. Secure HTTP (S-HTTP)

B. FTP Secure (FTPS)

C. Secure socket layer (SSL)

D. Sequenced Packet Exchange (SPX)

Browse 1074 Q&As
Questions 13

Which of the following protocols does not operate at the data link layer (layer 2)?

A. PPP

B. RARP

C. L2F

D. ICMP

Browse 1074 Q&As
Exam Code: SSCP
Exam Name: System Security Certified Practitioner (SSCP)
Last Update:
Questions: 1074 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99