Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

SSCP Exam Dumps - ISC 2 Credentials Questions and Answers

Question # 84

Which of the following ciphers is a subset on which the Vigenere polyalphabetic cipher was based on?

Options:

A.

Caesar

B.

The Jefferson disks

C.

Enigma

D.

SIGABA

Buy Now
Question # 85

Cryptography does NOT help in:

Options:

A.

Detecting fraudulent insertion.

B.

Detecting fraudulent deletion.

C.

Detecting fraudulent modification.

D.

Detecting fraudulent disclosure.

Buy Now
Question # 86

Which of the following is true about Kerberos?

Options:

A.

It utilizes public key cryptography.

B.

It encrypts data after a ticket is granted, but passwords are exchanged in plain text.

C.

It depends upon symmetric ciphers.

D.

It is a second party authentication system.

Buy Now
Question # 87

What is the length of an MD5 message digest?

Options:

A.

128 bits

B.

160 bits

C.

256 bits

D.

varies depending upon the message size.

Buy Now
Question # 88

Which of the following is defined as an Internet, IPsec, key-establishment protocol, partly based on OAKLEY, that is intended for putting in place authenticated keying material for use with ISAKMP and for other security associations?

Options:

A.

Internet Key exchange (IKE)

B.

Security Association Authentication Protocol (SAAP)

C.

Simple Key-management for Internet Protocols (SKIP)

D.

Key Exchange Algorithm (KEA)

Buy Now
Question # 89

You work in a police department forensics lab where you examine computers for evidence of crimes. Your work is vital to the success of the prosecution of criminals.

One day you receive a laptop and are part of a two man team responsible for examining it together. However, it is lunch time and after receiving the laptop you leave it on your desk and you both head out to lunch.

What critical step in forensic evidence have you forgotten?

Options:

A.

Chain of custody

B.

Locking the laptop in your desk

C.

Making a disk image for examination

D.

Cracking the admin password with chntpw

Buy Now
Question # 90

What is the primary role of cross certification?

Options:

A.

Creating trust between different PKIs

B.

Build an overall PKI hierarchy

C.

set up direct trust to a second root CA

D.

Prevent the nullification of user certificates by CA certificate revocation

Buy Now
Question # 91

The RSA algorithm is an example of what type of cryptography?

Options:

A.

Asymmetric Key.

B.

Symmetric Key.

C.

Secret Key.

D.

Private Key.

Buy Now
Question # 92

In a known plaintext attack, the cryptanalyst has knowledge of which of the following?

Options:

A.

the ciphertext and the key

B.

the plaintext and the secret key

C.

both the plaintext and the associated ciphertext of several messages

D.

the plaintext and the algorithm

Buy Now
Question # 93

Which of the following was developed in order to protect against fraud in electronic fund transfers (EFT) by ensuring the message comes from its claimed originator and that it has not been altered in transmission?

Options:

A.

Secure Electronic Transaction (SET)

B.

Message Authentication Code (MAC)

C.

Cyclic Redundancy Check (CRC)

D.

Secure Hash Standard (SHS)

Buy Now
Exam Code: SSCP
Exam Name: Systems Security Certified Practitioner
Last Update: Jan 31, 2025
Questions: 1074
SSCP pdf

SSCP PDF

$25.5  $84.99
SSCP Engine

SSCP Testing Engine

$28.5  $94.99
SSCP PDF + Engine

SSCP PDF + Testing Engine

$40.5  $134.99