Online SSCP Practice TestMore ISC2 Products >

Free ISC2 SSCP Exam Dumps Questions

ISC2 SSCP: System Security Certified Practitioner (SSCP)

- Get instant access to SSCP practice exam questions

- Get ready to pass the System Security Certified Practitioner (SSCP) exam right now using our ISC2 SSCP exam package, which includes ISC2 SSCP practice test plus an ISC2 SSCP Exam Simulator.

- The best online SSCP exam study material and preparation tool is here.

4.5 
(1335 ratings)

Question 1

- (Topic 5)
What is the RESULT of a hash algorithm being applied to a message ?

Correct Answer:C
As when a hash algorithm is applied on a message , it produces a message digest.
The other answers are incorrect because :
A digital signature is a hash value that has been encrypted with a sender's private key. A ciphertext is a message that appears to be unreadable.
A plaintext is a readable data.
Reference : Shon Harris , AIO v3 , Chapter-8 : Cryptography , Page : 593-594 , 640 , 648

Question 2

- (Topic 5)
Which of the following issues is not addressed by digital signatures?

Correct Answer:D
A digital signature directly addresses both confidentiality and integrity of the CIA triad. It does not directly address availability, which is what denial-of-service attacks.
The other answers are not correct because:
"nonrepudiation" is not correct because a digital signature can provide for nonrepudiation. "authentication" is not correct because a digital signature can be used as an authentication mechanism
"data integrity" is not correct because a digital signature does verify data integrity (as part of nonrepudiation)
References:
Official ISC2 Guide page: 227 & 265 All in One Third Edition page: 648

Question 3

- (Topic 2)
Which of the following is NOT a proper component of Media Viability Controls?

Correct Answer:B
Media Viability Controls include marking, handling and storage.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 231.

Question 4

- (Topic 6)
Packet Filtering Firewalls can also enable access for:

Correct Answer:A
Firewall rules can be used to enable access for traffic to specific ports or services. "Service numbers" is rather stilted English but you may encounter these types of wordings on the actual exam -- don't let them confuse you.
"Only unauthorized application port or service numbers" is incorrect. Unauthorized ports/services would be blocked in a properly installed firewall rather than permitting access.
"Only authorized application port or ex-service numbers" is incorrect. "Ex-service" numbers is a nonsense term meant to distract you.
"Only authorized application port or service integers." While service numbers are in fact integers, the more usual (and therefore better) answer is either service or "service number."
References CBK, p. 464
AIO3, pp. 482 ?C 484

Question 5

- (Topic 6)
Which of the following media is MOST resistant to EMI interference?

Correct Answer:B
A fiber optic cable is a physical medium that is capable of conducting modulated light trasmission. Fiber optic cable carries signals as light waves, thus creating higher trasmission speeds and greater distances due to less attenuation. This type of cabling is more difficult to tap than other cabling and is most resistant to interference, especially EMI.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 103).

Question 6

- (Topic 1)
Which of the following describes the major disadvantage of many Single Sign-On (SSO) implementations?

Correct Answer:A
Single Sign-On is a distrubuted Access Control methodology where an individual only has to authenticate once and would have access to all primary and secondary network domains. The individual would not be required to re-authenticate when they needed additional resources. The security issue that this creates is if a fraudster is able to compromise those credential they too would have access to all the resources that account has access to.
All the other answers are incorrect as they are distractors.

START SSCP EXAM