Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 17

A code, as is pertains to cryptography:

A.

Is a generic term for encryption.

B.

Is specific to substitution ciphers.

C.

Deals with linguistic units.

D.

Is specific to transposition ciphers.

Full Access
Question # 18

Secure Sockets Layer (SSL) uses a Message Authentication Code (MAC) for what purpose?

A.

message non-repudiation.

B.

message confidentiality.

C.

message interleave checking.

D.

message integrity.

Full Access
Question # 19

Which of the following does NOT concern itself with key management?

A.

Internet Security Association Key Management Protocol (ISAKMP)

B.

Diffie-Hellman (DH)

C.

Cryptology (CRYPTO)

D.

Key Exchange Algorithm (KEA)

Full Access
Question # 20

Which of the following statements pertaining to key management is incorrect?

A.

The more a key is used, the shorter its lifetime should be.

B.

When not using the full keyspace, the key should be extremely random.

C.

Keys should be backed up or escrowed in case of emergencies.

D.

A key's lifetime should correspond with the sensitivity of the data it is protecting.

Full Access
Question # 21

Which of the following statements pertaining to message digests is incorrect?

A.

The original file cannot be created from the message digest.

B.

Two different files should not have the same message digest.

C.

The message digest should be calculated using at least 128 bytes of the file.

D.

Messages digests are usually of fixed size.

Full Access
Question # 22

As a result of a risk assessment, your security manager has determined that your organization needs to implement an intrusion detection system that can detect unknown attacks and can watch for unusual traffic behavior, such as a new service appearing on the network. What type of intrusion detection system would you select?

A.

Protocol anomaly based

B.

Pattern matching

C.

Stateful matching

D.

Traffic anomaly-based

Full Access
Question # 23

Which of the following Intrusion Detection Systems (IDS) uses a database of attacks, known system vulnerabilities, monitoring current attempts to exploit those vulnerabilities, and then triggers an alarm if an attempt is found?

A.

Knowledge-Based ID System

B.

Application-Based ID System

C.

Host-Based ID System

D.

Network-Based ID System

Full Access
Question # 24

Which type of algorithm is considered to have the highest strength per bit of key length of any of the asymmetric algorithms?

A.

Rivest, Shamir, Adleman (RSA)

B.

El Gamal

C.

Elliptic Curve Cryptography (ECC)

D.

Advanced Encryption Standard (AES)

Full Access
Go to page: