Your success in ISC2 SSCP is our sole target and we develop all our SSCP braindumps in a way that facilitates the attainment of this target. Not only is our SSCP study material the best you can find, it is also the most detailed and the most updated. SSCP Practice Exams for ISC2 SSCP are written to the highest standards of technical accuracy.

Q121. ORRECT TEXT 

Public keys are used for ___________ messages and private keys are used for __________ messages. 

A. encrypting, depcrypting

Answer: A


Q122. _________ is the act of a user professing an identity to a system. 

A. Validation 

B. Authentication 

C. Identification 

D. Confirmation 

Answer:


Q123. Today, privacy violations are almost as serious as security violations? 

A. True 

B. False 

Answer:


Q124. ________ ___________ refers to the act of requiring more than on type of authentication to be used and is considered more secure than any single type of authentication.<br> (Choose two) 

A. One 

B. Two 

C. Three 

D. Factor 

E. Exponent 

F. Method 

Answer: BD 


Q125. ORRECT TEXT 

______________ is a vendor neutral authorization and authentication protocol used by Windows 2000. 

A. Kerberos

Answer: A


Q126. Which one of these formulas is used in Quantitative risk analysis? 

A. SLO - Single Loss Occurrence 

B. ARE - Annual Rate of Exposure 

C. SLE - Single Loss Expectancy 

D. ALO - Annual Loss Occurrence 

Answer:


Q127. What is the main difference between a logic bomb and a stealth virus? (Choose all that apply) 

A. Stealth viruses supply AV engines with false information to avoid detection 

B. Stealth viruses live in memory while logic bombs are written to disk 

C. Stealth viruses "wake up" at a pre-specified time in the code, then execute payload 

D. Logic Bombs supply AV engines with false information to avoid detection 

Answer: AB 


Q128. Spoofing is a sophisticated technique of authenticating one computer to another by forging IP packets from a trusted source address(True / False) 

A. True 

B. False 

Answer: