SSCP Updated
Q: 1
What is the name of a one way transformation of a string of characters into a usually shorter fixed-
length value or key that represents the original string? Such a transformation cannot be reversed?
Options
Q: 2
A multinational corporation has detected unusual activity suggesting that an attacker has gained access
to the hypervisor layer of their virtual environment. What is the most critical immediate step the security
team should take to mitigate the threat?
Options
Q: 3
What is the primary role of smartcards in a PKI?
Options
Q: 4
Which of the following services is NOT provided by the digital signature standard (DSS)?
Options
Q: 5
Which of the following is a method of multiplexing data where a communication channel is divided
into an arbitrary number of variable bit-rate digital channels or data streams. This method allocates
bandwidth dynamically to physical channels having information to transmit?
Options
Q: 6
What protocol is used on the Local Area Network (LAN) to obtain an IP address from it's known MAC
address?
Options
Q: 7
You have been tasked to develop an effective information classification program. Which one of the
following steps should be performed first?
Options
Q: 8
Which of the following LAN topologies offers the highest availability?
Options
Q: 9
Which of the following ASYMMETRIC encryption algorithms is based on the difficulty of FACTORING
LARGE NUMBERS?
Options
Q: 10
What is the effective key size of DES?
Options
Q: 11
What size is an MD5 message digest (hash)?
Options
Q: 12
Which of the following offers security to wireless communications?
Options
Q: 13
How many bits of a MAC address uniquely identify a vendor, as provided by the IEEE?
Options
Q: 14
Which of the following statements pertaining to message digests is incorrect?
Options
Q: 15
A circuit level proxy is
when compared to an application level proxy.
Options
Q: 16
The Diffie-Hellman algorithm is primarily used to provide which of the following?
Options
Q: 17
The International Standards Organization / Open Systems Interconnection (ISO/OSI) Layers does NOT
have which of the following characteristics?
Options
Q: 18
Which of the following should NOT normally be allowed through a firewall?
Options
Q: 19
What protocol is used to match an IP address to the appropriate hardware address of the packet's
destination so it can be sent?
Options
Q: 20
Packet Filtering Firewalls can also enable access for:
Options
Q: 21
Which of the following offers confidentiality to an e-mail message?
Options
Q: 22
When an outgoing request is made on a port number greater than 1023, this type of firewall creates
an ACL to allow the incoming reply on that port to pass:
Options
Q: 23
Layer 4 of the OSI stack is known as:
Options
Q: 24
Which of the following statements pertaining to link encryption is false?
Options
Q: 25
What is the key size of the International Data Encryption Algorithm (IDEA)?
Options
Q: 26
What uses a key of the same length as the message where each bit or character from the plaintext is
encrypted by a modular addition?
Options
Q: 27
What is the role of IKE within the IPsec protocol?
Options
Q: 28
Which of the following standards is concerned with message handling?
Options
Q: 29
Transport Layer Security (TLS) is a two-layered socket layer security protocol that contains the TLS
Record Protocol and the::
Options
Q: 30
Which of the following was not designed to be a proprietary encryption algorithm?
Options
Q: 31
Which OSI/ISO layer is responsible for determining the best route for data to be transferred?
Options
Q: 32
Which of the following is immune to the effects of electromagnetic interference (EMI) and therefore
has a much longer effective usable length?
Options
Q: 33
Which of the following is less likely to be used today in creating a Virtual Private Network?
Options
Q: 34
Which OSI/ISO layer is the Media Access Control (MAC) sublayer part of?
Options
Q: 35
A company is implementing a cloud-based storage solution to enhance its data resilience and ensure
quick recovery in case of data loss. The company needs to choose a solution that provides continuous
data protection and minimal downtime. Which strategy should the company prioritize?
Options
Question 1 of 35