Certbus > ISC > ISC Certification > SSCP > SSCP Online Practice Questions and Answers

SSCP Online Practice Questions and Answers

Questions 4

What is called a sequence of characters that is usually longer than the allotted number for a password?

A. passphrase

B. cognitive phrase

C. anticipated phrase

D. Real phrase

Browse 1074 Q&As
Questions 5

In regards to information classification what is the main responsibility of information (data) owner?

A. determining the data sensitivity or classification level

B. running regular data backups

C. audit the data users

D. periodically check the validity and accuracy of the data

Browse 1074 Q&As
Questions 6

Which of the following floors would be most appropriate to locate information processing facilities in a 6stories building?

A. Basement

B. Ground floor

C. Third floor

D. Sixth floor

Browse 1074 Q&As
Questions 7

In response to Access-request from a client such as a Network Access Server (NAS), which of the following is not one of the response from a RADIUS Server?

A. Access-Accept

B. Access-Reject

C. Access-Granted

D. Access-Challenge

Browse 1074 Q&As
Questions 8

Which of the following would be best suited to oversee the development of an information security policy?

A. System Administrators

B. End User

C. Security Officers

D. Security administrators

Browse 1074 Q&As
Questions 9

Risk reduction in a system development life-cycle should be applied:

A. Mostly to the initiation phase.

B. Mostly to the development phase.

C. Mostly to the disposal phase.

D. Equally to all phases.

Browse 1074 Q&As
Questions 10

Which of the following statements pertaining to the security kernel is incorrect?

A. The security kernel is made up of mechanisms that fall under the TCB and implements and enforces the reference monitor concept.

B. The security kernel must provide isolation for the processes carrying out the reference monitor concept and they must be tamperproof.

C. The security kernel must be small enough to be able to be tested and verified in a complete and comprehensive manner.

D. The security kernel is an access control concept, not an actual physical component.

Browse 1074 Q&As
Questions 11

The property of a system or a system resource being accessible and usable upon demand by an authorized system entity, according to performance specifications for the system is referred to as?

A. Confidentiality

B. Availability

C. Integrity

D. Reliability

Browse 1074 Q&As
Questions 12

In the days before CIDR (Classless Internet Domain Routing), networks were commonly organized by classes. Which of the following would have been true of a Class B network?

A. The first bit of the IP address would be set to zero.

B. The first bit of the IP address would be set to one and the second bit set to zero.

C. The first two bits of the IP address would be set to one, and the third bit set to zero.

D. The first three bits of the IP address would be set to one.

Browse 1074 Q&As
Questions 13

Which of the following would be used to detect and correct errors so that integrity and confidentiality of transactions over networks may be maintained while preventing unauthorize interception of the traffic?

A. Information security

B. Server security

C. Client security

D. Communications security

Browse 1074 Q&As
Questions 14

Which of the following is NOT a VPN communications protocol standard?

A. Point-to-point tunnelling protocol (PPTP)

B. Challenge Handshake Authentication Protocol (CHAP)

C. Layer 2 tunnelling protocol (L2TP)

D. IP Security

Browse 1074 Q&As
Questions 15

Which of the following is the biggest concern with firewall security?

A. Internal hackers

B. Complex configuration rules leading to misconfiguration

C. Buffer overflows

D. Distributed denial of service (DDOS) attacks

Browse 1074 Q&As
Questions 16

Which of the following statements pertaining to PPTP (Point-to-Point Tunneling Protocol) is incorrect?

A. PPTP allow the tunnelling of any protocols that can be carried within PPP.

B. PPTP does not provide strong encryption.

C. PPTP does not support any token-based authentication method for users.

D. PPTP is derived from L2TP.

Browse 1074 Q&As
Questions 17

Which of the following is the primary security feature of a proxy server?

A. Virus Detection

B. URL blocking

C. Route blocking

D. Content filtering

Browse 1074 Q&As
Questions 18

Which of the following service is a distributed database that translate host name to IP address to IP address to host name?

A. DNS

B. FTP

C. SSH

D. SMTP

Browse 1074 Q&As
Exam Code: SSCP
Exam Name: System Security Certified Practitioner (SSCP)
Last Update: Apr 18, 2024
Questions: 1074 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99