Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 9

Which of the following terms can be described as the process to conceal data into another file or media in a practice known as security through obscurity?

A.

Steganography

B.

ADS - Alternate Data Streams

C.

Encryption

D.

NTFS ADS

Full Access
Question # 10

What attribute is included in a X.509-certificate?

A.

Distinguished name of the subject

B.

Telephone number of the department

C.

secret key of the issuing CA

D.

the key pair of the certificate holder

Full Access
Question # 11

A one-way hash provides which of the following?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Authentication

Full Access
Question # 12

Which of the following cryptographic attacks describes when the attacker has a copy of the plaintext and the corresponding ciphertext?

A.

known plaintext

B.

brute force

C.

ciphertext only

D.

chosen plaintext

Full Access
Question # 13

Which of the following protects Kerberos against replay attacks?

A.

Tokens

B.

Passwords

C.

Cryptography

D.

Time stamps

Full Access
Question # 14

Which is NOT a suitable method for distributing certificate revocation information?

A.

CA revocation mailing list

B.

Delta CRL

C.

OCSP (online certificate status protocol)

D.

Distribution point CRL

Full Access
Question # 15

Which type of attack is based on the probability of two different messages using the same hash function producing a common message digest?

A.

Differential cryptanalysis

B.

Differential linear cryptanalysis

C.

Birthday attack

D.

Statistical attack

Full Access
Question # 16

Which of the following is a symmetric encryption algorithm?

A.

RSA

B.

Elliptic Curve

C.

RC5

D.

El Gamal

Full Access
Go to page: