11.11 Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

SSCP Exam Dumps - Systems Security Certified Practitioner

Searching for workable clues to ace the ISC SSCP Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s SSCP PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

Which of the following terms can be described as the process to conceal data into another file or media in a practice known as security through obscurity?

A.

Steganography

B.

ADS - Alternate Data Streams

C.

Encryption

D.

NTFS ADS

Full Access
Question # 10

What attribute is included in a X.509-certificate?

A.

Distinguished name of the subject

B.

Telephone number of the department

C.

secret key of the issuing CA

D.

the key pair of the certificate holder

Full Access
Question # 11

A one-way hash provides which of the following?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Authentication

Full Access
Question # 12

Which of the following cryptographic attacks describes when the attacker has a copy of the plaintext and the corresponding ciphertext?

A.

known plaintext

B.

brute force

C.

ciphertext only

D.

chosen plaintext

Full Access
Question # 13

Which of the following protects Kerberos against replay attacks?

A.

Tokens

B.

Passwords

C.

Cryptography

D.

Time stamps

Full Access
Question # 14

Which is NOT a suitable method for distributing certificate revocation information?

A.

CA revocation mailing list

B.

Delta CRL

C.

OCSP (online certificate status protocol)

D.

Distribution point CRL

Full Access
Question # 15

Which type of attack is based on the probability of two different messages using the same hash function producing a common message digest?

A.

Differential cryptanalysis

B.

Differential linear cryptanalysis

C.

Birthday attack

D.

Statistical attack

Full Access
Question # 16

Which of the following is a symmetric encryption algorithm?

A.

RSA

B.

Elliptic Curve

C.

RC5

D.

El Gamal

Full Access
Go to page: