Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

SSCP ISC Systems Security Certified Practitioner Free Practice Exam Questions (2025 Updated)

Prepare effectively for your ISC SSCP Systems Security Certified Practitioner certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 4 / 7
Total 1074 questions

Which of the following elements is NOT included in a Public Key Infrastructure (PKI)?

A.

Timestamping

B.

Repository

C.

Certificate revocation

D.

Internet Key Exchange (IKE)

Which of the following ciphers is a subset on which the Vigenere polyalphabetic cipher was based on?

A.

Caesar

B.

The Jefferson disks

C.

Enigma

D.

SIGABA

What uses a key of the same length as the message where each bit or character from the plaintext is encrypted by a modular addition?

A.

Running key cipher

B.

One-time pad

C.

Steganography

D.

Cipher block chaining

Where parties do not have a shared secret and large quantities of sensitive information must be passed, the most efficient means of transferring information is to use Hybrid Encryption Methods. What does this mean?

A.

Use of public key encryption to secure a secret key, and message encryption using the secret key.

B.

Use of the recipient's public key for encryption and decryption based on the recipient's private key.

C.

Use of software encryption assisted by a hardware encryption accelerator.

D.

Use of elliptic curve encryption.

Which of the following is true about Kerberos?

A.

It utilizes public key cryptography.

B.

It encrypts data after a ticket is granted, but passwords are exchanged in plain text.

C.

It depends upon symmetric ciphers.

D.

It is a second party authentication system.

The Secure Hash Algorithm (SHA-1) creates:

A.

a fixed length message digest from a fixed length input message

B.

a variable length message digest from a variable length input message

C.

a fixed length message digest from a variable length input message

D.

a variable length message digest from a fixed length input message

What kind of certificate is used to validate a user identity?

A.

Public key certificate

B.

Attribute certificate

C.

Root certificate

D.

Code signing certificate

Which of the following statements pertaining to stream ciphers is correct?

A.

A stream cipher is a type of asymmetric encryption algorithm.

B.

A stream cipher generates what is called a keystream.

C.

A stream cipher is slower than a block cipher.

D.

A stream cipher is not appropriate for hardware-based encryption.

What attribute is included in a X.509-certificate?

A.

Distinguished name of the subject

B.

Telephone number of the department

C.

secret key of the issuing CA

D.

the key pair of the certificate holder

A one-way hash provides which of the following?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

Authentication

Which of the following would best describe certificate path validation?

A.

Verification of the validity of all certificates of the certificate chain to the root certificate

B.

Verification of the integrity of the associated root certificate

C.

Verification of the integrity of the concerned private key

D.

Verification of the revocation status of the concerned certificate

Which of the following encryption algorithms does not deal with discrete logarithms?

A.

El Gamal

B.

Diffie-Hellman

C.

RSA

D.

Elliptic Curve

Which of the following does NOT concern itself with key management?

A.

Internet Security Association Key Management Protocol (ISAKMP)

B.

Diffie-Hellman (DH)

C.

Cryptology (CRYPTO)

D.

Key Exchange Algorithm (KEA)

What is the name of the protocol use to set up and manage Security Associations (SA) for IP Security (IPSec)?

A.

Internet Key Exchange (IKE)

B.

Secure Key Exchange Mechanism

C.

Oakley

D.

Internet Security Association and Key Management Protocol

Which of the following service is not provided by a public key infrastructure (PKI)?

A.

Access control

B.

Integrity

C.

Authentication

D.

Reliability

What can be defined as an instance of two different keys generating the same ciphertext from the same plaintext?

A.

Key collision

B.

Key clustering

C.

Hashing

D.

Ciphertext collision

What is used to bind a document to its creation at a particular time?

A.

Network Time Protocol (NTP)

B.

Digital Signature

C.

Digital Timestamp

D.

Certification Authority (CA)

What is the role of IKE within the IPsec protocol?

A.

peer authentication and key exchange

B.

data encryption

C.

data signature

D.

enforcing quality of service

Java is not:

A.

Object-oriented.

B.

Distributed.

C.

Architecture Specific.

D.

Multithreaded.

Which of the following technologies is a target of XSS or CSS (Cross-Site Scripting) attacks?

A.

Web Applications

B.

Intrusion Detection Systems

C.

Firewalls

D.

DNS Servers

In computing what is the name of a non-self-replicating type of malware program containing malicious code that appears to have some useful purpose but also contains code that has a malicious or harmful purpose imbedded in it, when executed, carries out actions that are unknown to the person installing it, typically causing loss or theft of data, and possible system harm.

A.

virus

B.

worm

C.

Trojan horse.

D.

trapdoor

Which of the following virus types changes some of its characteristics as it spreads?

A.

Boot Sector

B.

Parasitic

C.

Stealth

D.

Polymorphic

Virus scanning and content inspection of SMIME encrypted e-mail without doing any further processing is:

A.

Not possible

B.

Only possible with key recovery scheme of all user keys

C.

It is possible only if X509 Version 3 certificates are used

D.

It is possible only by "brute force" decryption

Which of the following computer crime is MORE often associated with INSIDERS?

A.

IP spoofing

B.

Password sniffing

C.

Data diddling

D.

Denial of service (DOS)

What best describes a scenario when an employee has been shaving off pennies from multiple accounts and depositing the funds into his own bank account?

A.

Data fiddling

B.

Data diddling

C.

Salami techniques

D.

Trojan horses

What is malware that can spread itself over open network connections?

A.

Worm

B.

Rootkit

C.

Adware

D.

Logic Bomb

What do the ILOVEYOU and Melissa virus attacks have in common?

A.

They are both denial-of-service (DOS) attacks.

B.

They have nothing in common.

C.

They are both masquerading attacks.

D.

They are both social engineering attacks.

The high availability of multiple all-inclusive, easy-to-use hacking tools that do NOT require much technical knowledge has brought a growth in the number of which type of attackers?

A.

Black hats

B.

White hats

C.

Script kiddies

D.

Phreakers

Which virus category has the capability of changing its own code, making it harder to detect by anti-virus software?

A.

Stealth viruses

B.

Polymorphic viruses

C.

Trojan horses

D.

Logic bombs

Crackers today are MOST often motivated by their desire to:

A.

Help the community in securing their networks.

B.

Seeing how far their skills will take them.

C.

Getting recognition for their actions.

D.

Gaining Money or Financial Gains.

Controls to keep password sniffing attacks from compromising computer systems include which of the following?

A.

static and recurring passwords.

B.

encryption and recurring passwords.

C.

one-time passwords and encryption.

D.

static and one-time passwords.

An attack initiated by an entity that is authorized to access system resources but uses them in a way not approved by those who granted the authorization is known as a(n):

A.

active attack

B.

outside attack

C.

inside attack

D.

passive attack

What is the primary role of smartcards in a PKI?

A.

Transparent renewal of user keys

B.

Easy distribution of the certificates between the users

C.

Fast hardware encryption of the raw data

D.

Tamper resistant, mobile storage and application of private keys of the users

What is called a password that is the same for each log-on session?

A.

"one-time password"

B.

"two-time password"

C.

static password

D.

dynamic password

Identification and authentication are the keystones of most access control systems. Identification establishes:

A.

User accountability for the actions on the system.

B.

Top management accountability for the actions on the system.

C.

EDP department accountability for the actions of users on the system.

D.

Authentication for actions on the system

The three classic ways of authenticating yourself to the computer security software are: something you know, something you have, and something:

A.

you need.

B.

you read.

C.

you are.

D.

you do.

In the context of access control, locks, gates, guards are examples of which of the following?

A.

Administrative controls

B.

Technical controls

C.

Physical controls

D.

Logical controls

The Orange Book is founded upon which security policy model?

A.

The Biba Model

B.

The Bell LaPadula Model

C.

Clark-Wilson Model

D.

TEMPEST

Which of the following pairings uses technology to enforce access control policies?

A.

Preventive/Administrative

B.

Preventive/Technical

C.

Preventive/Physical

D.

Detective/Administrative

Which of the following is needed for System Accountability?

A.

Audit mechanisms.

B.

Documented design as laid out in the Common Criteria.

C.

Authorization.

D.

Formal verification of system design.

Page: 4 / 7
Total 1074 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved