SSCP PRACTICE TESTS QUESTIONS
WITH CORRECT ANSWERS
How does IPSec verify that data arrived at the destination without intentional or
accidental corruption? - Correct Answers -By using a randomized hashing operation
How is quantitative risk analysis performed? - Correct Answers -Using calculations
Your company adopts a new end-user security awareness program. This training
includes malware introduction, social media issues, password guidelines, data
exposure, and lost devices. How often should end users receive this training? - Correct
Answers -upon new hire and once a year thereafter
Your organization experienced an impersonation attack recently that compromised the
network administrator's user account. In response, new security measures are being
implemented throughout the organization. You have been assigned the task of
improving authentication. You want a new authentication system that ensures the
following:
Eavesdropped passwords cannot be used by an attacker.
Passwords are only able to be used once.
Password predication must be prevented.
Passwords are only valid for a short period of time.
How can you accomplish these goals? - Correct Answers -Implement a synchronized,
one-time password token-based authentication system.
How can a user be assured that a file downloaded from a vendor's Web site is free from
malicious code? - Correct Answers -Check the file's signature and hash calculation.
Why do many security monitoring systems produce a visualization of the collected
results? - Correct Answers -It represents complex or bulky data in an easy to
understand format.
What is the name of a cryptographic attack based on a database of pre-computed hash
values and the original plaintext values? - Correct Answers -Rainbow table attack
In addition to having at least one year of relevant experience in a domain of SSCP, what
is another requirement to be qualified to take the SSCP exam? - Correct Answers -
Agreeing to abide by the (ISC)2 Code Of Ethics
What is the definition of the principle of least privilege? - Correct Answers -Users are
assigned minimal privileges sufficient to accomplish job responsibilities.
, A common attack against converged network communications is eavesdropping. How
can this attack be prevented? - Correct Answers -Use a VPN.
What is the term used to describe an entry in a database describing a violation or
exploit which is used to match real-time events in order to detect and record attacks by
the continuous monitoring solution? - Correct Answers -Signature
What would the most successful means of attacking an environment relying upon guest
OSes that would result in the destruction or loss of use of the guest OSes be? - Correct
Answers -Compromise the host OS.
What is the technology that enables a user to authenticate to a company network from
their assigned workstation and then be able to interact with resources throughout the
private network without needing to enter additional credentials? - Correct Answers -
Single sign-on
What is a means to ensure that endpoint devices can interact with the Internet while
minimizing risk of system compromise? - Correct Answers -Use a virtualized OS.
When designing end-user training to teach employees about using cryptography within
business tasks, which of the following is an important element to include? - Correct
Answers -The consequences of failing to encrypt
Which of the following is not considered an example of a non-discretionary access
control system? - Correct Answers -ACL
John works in an organization. He is trying to insert a password to log in his account on
the organization's login website. Which of the following best describes the use of
passwords for access control? - Correct Answers -Authentication
What virtual environment tool allows for testing and experimentation within a guest OS
while providing a means to roll-back to a previous stable state in just seconds? - Correct
Answers -Snapshots
What is the cost benefit equation? - Correct Answers -[ALE1 - ALE2] - CCM
When network access control (NAC) determines that a system lacks specific
configuration settings or is missing a required update, what should occur? - Correct
Answers -Quarantine
What is a common means to discover a violating event? - Correct Answers -Intrusion
detection system (IDS)
When performing system hardening, what are the two primary phases or operations to
be performed? - Correct Answers -Remove what is unnecessary, and lock down
whatever remains.
WITH CORRECT ANSWERS
How does IPSec verify that data arrived at the destination without intentional or
accidental corruption? - Correct Answers -By using a randomized hashing operation
How is quantitative risk analysis performed? - Correct Answers -Using calculations
Your company adopts a new end-user security awareness program. This training
includes malware introduction, social media issues, password guidelines, data
exposure, and lost devices. How often should end users receive this training? - Correct
Answers -upon new hire and once a year thereafter
Your organization experienced an impersonation attack recently that compromised the
network administrator's user account. In response, new security measures are being
implemented throughout the organization. You have been assigned the task of
improving authentication. You want a new authentication system that ensures the
following:
Eavesdropped passwords cannot be used by an attacker.
Passwords are only able to be used once.
Password predication must be prevented.
Passwords are only valid for a short period of time.
How can you accomplish these goals? - Correct Answers -Implement a synchronized,
one-time password token-based authentication system.
How can a user be assured that a file downloaded from a vendor's Web site is free from
malicious code? - Correct Answers -Check the file's signature and hash calculation.
Why do many security monitoring systems produce a visualization of the collected
results? - Correct Answers -It represents complex or bulky data in an easy to
understand format.
What is the name of a cryptographic attack based on a database of pre-computed hash
values and the original plaintext values? - Correct Answers -Rainbow table attack
In addition to having at least one year of relevant experience in a domain of SSCP, what
is another requirement to be qualified to take the SSCP exam? - Correct Answers -
Agreeing to abide by the (ISC)2 Code Of Ethics
What is the definition of the principle of least privilege? - Correct Answers -Users are
assigned minimal privileges sufficient to accomplish job responsibilities.
, A common attack against converged network communications is eavesdropping. How
can this attack be prevented? - Correct Answers -Use a VPN.
What is the term used to describe an entry in a database describing a violation or
exploit which is used to match real-time events in order to detect and record attacks by
the continuous monitoring solution? - Correct Answers -Signature
What would the most successful means of attacking an environment relying upon guest
OSes that would result in the destruction or loss of use of the guest OSes be? - Correct
Answers -Compromise the host OS.
What is the technology that enables a user to authenticate to a company network from
their assigned workstation and then be able to interact with resources throughout the
private network without needing to enter additional credentials? - Correct Answers -
Single sign-on
What is a means to ensure that endpoint devices can interact with the Internet while
minimizing risk of system compromise? - Correct Answers -Use a virtualized OS.
When designing end-user training to teach employees about using cryptography within
business tasks, which of the following is an important element to include? - Correct
Answers -The consequences of failing to encrypt
Which of the following is not considered an example of a non-discretionary access
control system? - Correct Answers -ACL
John works in an organization. He is trying to insert a password to log in his account on
the organization's login website. Which of the following best describes the use of
passwords for access control? - Correct Answers -Authentication
What virtual environment tool allows for testing and experimentation within a guest OS
while providing a means to roll-back to a previous stable state in just seconds? - Correct
Answers -Snapshots
What is the cost benefit equation? - Correct Answers -[ALE1 - ALE2] - CCM
When network access control (NAC) determines that a system lacks specific
configuration settings or is missing a required update, what should occur? - Correct
Answers -Quarantine
What is a common means to discover a violating event? - Correct Answers -Intrusion
detection system (IDS)
When performing system hardening, what are the two primary phases or operations to
be performed? - Correct Answers -Remove what is unnecessary, and lock down
whatever remains.