we provide Accurate ISC2 SSCP practice exam which are the best for clearing SSCP test, and to get certified by ISC2 System Security Certified Practitioner (SSCP). The SSCP Questions & Answers covers all the knowledge points of the real SSCP exam. Crack your ISC2 SSCP Exam with latest dumps, guaranteed!
Q33. ORRECT TEXT
A ______________ is an electronically generated record that ties a user's ID to their public key.
A. Certificate
Answer: A
Q34. Macintosh computers are not at risk for receiving viruses.
A. True
B. False
Answer: B
Q35. Kerberos uses asymmetric encryption.(True / False)
A. True
B. False
Answer: B
Q36. ORRECT TEXT
The two categories of threats are natural and ___________.
A. Human
Answer: A
Q37. Select the major difference(s) between block and stream ciphers. (Choose all that apply)
A. Block = bit by bit = encrypted in equal sections
B. Streams = bit by bit; block = encrypted in equal sections
C. Block = hardware driven; stream = software driven
D. Stream = hardware driven; block = software driven
E. Block = slower encryption; stream = fast encryption
Answer: BDE
Q38. Vulnerability x Threat = RISK is an example of the _______________.
A. Disaster Recovery Equation
B. Threat Assessment
C. Risk Equation
D. Calculation of Annual Loss Expectancy
Answer: C
Q39. What are the two most critical aspects of risk analysis? (Choose two)
A. Identifying vulnerabilities
B. Identifying threats
C. Identifying resources
D. Identifying assets
Answer: BD
Q40. The term "principle of least privilege" is best as:
A. A separation of command, program and interface functions
B. Active monitoring with network base intrusion detection systems and host based intrusion detection systems
C. The process of granting each user the lowest clearance and access needed to accomplish their task
D. Implementation of mandatory access control
Answer: C