Your success in ISC2 SSCP is our sole target and we develop all our SSCP braindumps in a way that facilitates the attainment of this target. Not only is our SSCP study material the best you can find, it is also the most detailed and the most updated. SSCP Practice Exams for ISC2 SSCP are written to the highest standards of technical accuracy.
Q121. ORRECT TEXT
Public keys are used for ___________ messages and private keys are used for __________ messages.
A. encrypting, depcrypting
Answer: A
Q122. _________ is the act of a user professing an identity to a system.
A. Validation
B. Authentication
C. Identification
D. Confirmation
Answer: C
Q123. Today, privacy violations are almost as serious as security violations?
A. True
B. False
Answer: A
Q124. ________ ___________ refers to the act of requiring more than on type of authentication to be used and is considered more secure than any single type of authentication.<br> (Choose two)
A. One
B. Two
C. Three
D. Factor
E. Exponent
F. Method
Answer: BD
Q125. ORRECT TEXT
______________ is a vendor neutral authorization and authentication protocol used by Windows 2000.
A. Kerberos
Answer: A
Q126. Which one of these formulas is used in Quantitative risk analysis?
A. SLO - Single Loss Occurrence
B. ARE - Annual Rate of Exposure
C. SLE - Single Loss Expectancy
D. ALO - Annual Loss Occurrence
Answer: C
Q127. What is the main difference between a logic bomb and a stealth virus? (Choose all that apply)
A. Stealth viruses supply AV engines with false information to avoid detection
B. Stealth viruses live in memory while logic bombs are written to disk
C. Stealth viruses "wake up" at a pre-specified time in the code, then execute payload
D. Logic Bombs supply AV engines with false information to avoid detection
Answer: AB
Q128. Spoofing is a sophisticated technique of authenticating one computer to another by forging IP packets from a trusted source address(True / False)
A. True
B. False
Answer: A