Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Go to page:
Question # 4

What is the primary role of cross certification?

A.

Creating trust between different PKIs

B.

Build an overall PKI hierarchy

C.

set up direct trust to a second root CA

D.

Prevent the nullification of user certificates by CA certificate revocation

Full Access
Question # 5

What uses a key of the same length as the message where each bit or character from the plaintext is encrypted by a modular addition?

A.

Running key cipher

B.

One-time pad

C.

Steganography

D.

Cipher block chaining

Full Access
Question # 6

Which of the following can best be defined as a cryptanalysis technique in which the analyst tries to determine the key from knowledge of some plaintext-ciphertext pairs?

A.

A known-plaintext attack

B.

A known-algorithm attack

C.

A chosen-ciphertext attack

D.

A chosen-plaintext attack

Full Access
Question # 7

Which of the following concerning the Rijndael block cipher algorithm is false?

A.

The design of Rijndael was strongly influenced by the design of the block cipher Square.

B.

A total of 25 combinations of key length and block length are possible

C.

Both block size and key length can be extended to multiples of 64 bits.

D.

The cipher has a variable block length and key length.

Full Access
Question # 8

Kerberos depends upon what encryption method?

A.

Public Key cryptography.

B.

Secret Key cryptography.

C.

El Gamal cryptography.

D.

Blowfish cryptography.

Full Access
Go to page: