Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SSCP Exam Dumps - ISC 2 Credentials Questions and Answers

Question # 134

Kerberos depends upon what encryption method?

Options:

A.

Public Key cryptography.

B.

Secret Key cryptography.

C.

El Gamal cryptography.

D.

Blowfish cryptography.

Buy Now
Question # 135

Which of the following was developed by the National Computer Security Center (NCSC) for the US Department of Defense ?

Options:

A.

TCSEC

B.

ITSEC

C.

DIACAP

D.

NIACAP

Buy Now
Question # 136

Sensitivity labels are an example of what application control type?

Options:

A.

Preventive security controls

B.

Detective security controls

C.

Compensating administrative controls

D.

Preventive accuracy controls

Buy Now
Question # 137

Which of the following is used to interrupt the opportunity to use or perform collusion to subvert operation for fraudulent purposes?

Options:

A.

Key escrow

B.

Rotation of duties

C.

Principle of need-to-know

D.

Principle of least privilege

Buy Now
Question # 138

What is a hot-site facility?

Options:

A.

A site with pre-installed computers, raised flooring, air conditioning, telecommunications and networking equipment, and UPS.

B.

A site in which space is reserved with pre-installed wiring and raised floors.

C.

A site with raised flooring, air conditioning, telecommunications, and networking equipment, and UPS.

D.

A site with ready made work space with telecommunications equipment, LANs, PCs, and terminals for work groups.

Buy Now
Question # 139

Which device acting as a translator is used to connect two networks or applications from layer 4 up to layer 7 of the ISO/OSI Model?

Options:

A.

Bridge

B.

Repeater

C.

Router

D.

Gateway

Buy Now
Question # 140

Which of the following is best defined as an administrative declaration by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards?

Options:

A.

Certification

B.

Declaration

C.

Audit

D.

Accreditation

Buy Now
Question # 141

Which of the following statements pertaining to using Kerberos without any extension is false?

Options:

A.

A client can be impersonated by password-guessing.

B.

Kerberos is mostly a third-party authentication protocol.

C.

Kerberos uses public key cryptography.

D.

Kerberos provides robust authentication.

Buy Now
Exam Code: SSCP
Exam Name: Systems Security Certified Practitioner
Last Update: Jan 31, 2025
Questions: 1074
SSCP pdf

SSCP PDF

$25.5  $84.99
SSCP Engine

SSCP Testing Engine

$28.5  $94.99
SSCP PDF + Engine

SSCP PDF + Testing Engine

$40.5  $134.99