Free Certification Practice Questions

ISC-SSCP

Loading…
SSCP Which of the following backup methods is primarily run when time and tape space permits, and is used for the system archive or baselined tape sets?
#121
SSCP Which of the following outlined how senior management are responsible for the computer and information security decisions that they make and what actually took place within their organizations?
#122
SSCP An Intrusion Detection System (IDS) is what type of control?
#123
SSCP To protect and/or restore lost, corrupted, or deleted information, thereby preserving the data integrity and availability is the purpose of:
#124
SSCP Which of the following is an example of an active attack?
#125
SSCP A copy of evidence or oral description of its contents; which is not as reliable as best evidence is what type of evidence?
#126
SSCP In the statement below, fill in the blank:Law enforcement agencies must get a warrant to search and seize an individual's property, as stated in the _____ Amendment.
#127
SSCP Computer security should be first and foremost which of the following:
#128
SSCP Why would a memory dump be admissible as evidence in court?
#129
SSCP Which type of attack would a competitive intelligence attack best classify as?
#130
SSCP When a possible intrusion into your organization's information system has been detected, which of the following actions should be performed first?
#131
SSCP When first analyzing an intrusion that has just been detected and confirming that it is a true positive, which of the following actions should be done as a first step if you wish to prosecute the attacker in court?
#132
SSCP Which of the following statements do not apply to a hot site?
#133
SSCP Where parties do not have a shared secret and large quantities of sensitive information must be passed, the most efficient means of transferring information is to use Hybrid Encryption Methods. What does this mean?
#134
SSCP Brute force attacks against encryption keys have increased in potency because of increased computing power. Which of the following is often considered a good protection against the brute force cryptography attack?
#135
SSCP What is the role of IKE within the IPsec protocol?
#136
SSCP In which phase of Internet Key Exchange (IKE) protocol is peer authentication performed?
#137
SSCP In a hierarchical PKI the highest CA is regularly called Root CA, it is also referred to by which one of the following term?
#138
SSCP A X.509 public key certificate with the key usage attribute "non repudiation" can be used for which of the following?
#139
SSCP Which of the following can best define the "revocation request grace period"?
#140
SSCP Which of the following ASYMMETRIC encryption algorithms is based on the difficulty of FACTORING LARGE NUMBERS?
#141
SSCP What can be defined as an instance of two different keys generating the same ciphertext from the same plaintext?
#142
SSCP Which of the following algorithms is used today for encryption in PGP?
#143
SSCP Which of the following offers security to wireless communications?
#144
SSCP Cryptography does not concern itself with which of the following choices?
#145
SSCP In the days before CIDR (Classless Internet Domain Routing), networks were commonly organized by classes. Which of the following would have been true of aClass B network?
#146
SSCP Which one of the following is usually not a benefit resulting from the use of firewalls?
#147
SSCP Within the OSI model, at what layer are some of the SLIP, CSLIP, PPP control functions provided?
#148
SSCP Which of the following is unlike the other three choices presented?
#149
SSCP In which layer of the OSI Model are connection-oriented protocols located in the TCP/IP suite of protocols?
#150