Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC SSCP - Systems Security Certified Practitioner

Page: 8 / 14
Total 1074 questions

Which xDSL flavour delivers both downstream and upstream speeds of 1.544 Mbps over two copper twisted pairs?

A.

HDSL

B.

SDSL

C.

ADSL

D.

VDSL

What is the main characteristic of a multi-homed host?

A.

It is placed between two routers or firewalls.

B.

It allows IP routing.

C.

It has multiple network interfaces, each connected to separate networks.

D.

It operates at multiple layers.

What layer of the ISO/OSI model do routers normally operate at?

A.

Data link layer

B.

Session layer

C.

Transport layer

D.

Network layer

What is the proper term to refer to a single unit of IP data?

A.

IP segment.

B.

IP datagram.

C.

IP frame.

D.

IP fragment.

Similar to Secure Shell (SSH-2), Secure Sockets Layer (SSL) uses symmetric encryption for encrypting the bulk of the data being sent over the session and it uses asymmetric or public key cryptography for:

A.

Peer Authentication

B.

Peer Identification

C.

Server Authentication

D.

Name Resolution

What is a packet sniffer?

A.

It tracks network connections to off-site locations.

B.

It monitors network traffic for illegal packets.

C.

It scans network segments for cabling faults.

D.

It captures network traffic for later analysis.

Which of the following protocols' primary function is to send messages between network devices regarding the health of the network?

A.

Reverse Address Resolution Protocol (RARP).

B.

Address Resolution Protocol (ARP).

C.

Internet Protocol (IP).

D.

Internet Control Message protocol (ICMP).

Which of the following statements pertaining to firewalls is incorrect?

A.

Firewalls create bottlenecks between the internal and external network.

B.

Firewalls allow for centralization of security services in machines optimized and dedicated to the task.

C.

Firewalls protect a network at all layers of the OSI models.

D.

Firewalls are used to create security checkpoints at the boundaries of private networks.

What can a packet filtering firewall also be called?

A.

a scanning router

B.

a shielding router

C.

a sniffing router

D.

a screening router

Which layer of the DoD TCP/IP model controls the communication flow between hosts?

A.

Internet layer

B.

Host-to-host transport layer

C.

Application layer

D.

Network access layer

Which of the following is an extension to Network Address Translation that permits multiple devices providing services on a local area network (LAN) to be mapped to a single public IP address?

A.

IP Spoofing

B.

IP subnetting

C.

Port address translation

D.

IP Distribution

Which type of firewall can be used to track connectionless protocols such as UDP and RPC?

A.

Stateful inspection firewalls

B.

Packet filtering firewalls

C.

Application level firewalls

D.

Circuit level firewalls

Which of the following statements pertaining to PPTP (Point-to-Point Tunneling Protocol) is incorrect?

A.

PPTP allow the tunnelling of any protocols that can be carried within PPP.

B.

PPTP does not provide strong encryption.

C.

PPTP does not support any token-based authentication method for users.

D.

PPTP is derived from L2TP.

Which of the following service is a distributed database that translate host name to IP address to IP address to host name?

A.

DNS

B.

FTP

C.

SSH

D.

SMTP

Which of the following elements of telecommunications is not used in assuring confidentiality?

A.

Network security protocols

B.

Network authentication services

C.

Data encryption services

D.

Passwords

Secure Electronic Transaction (SET) and Secure HTTP (S-HTTP) operate at which layer of the OSI model?

A.

Application Layer.

B.

Transport Layer.

C.

Session Layer.

D.

Network Layer.

Why are coaxial cables called "coaxial"?

A.

it includes two physical channels that carries the signal surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis.

B.

it includes one physical channel that carries the signal surrounded (after a layer of insulation) by another concentric physical channel, both running along the same axis

C.

it includes two physical channels that carries the signal surrounded (after a layer of insulation) by another two concentric physical channels, both running along the same axis.

D.

it includes one physical channel that carries the signal surrounded (after a layer of insulation) by another concentric physical channel, both running perpendicular and along the different axis

You are running a packet sniffer on a network and see a packet containing a long string of "0x90 0x90 0x90 0x90...." in the middle of it traveling to an x86-based machine as a target. This could be indicative of what activity being attempted?

A.

Over-subscription of the traffic on a backbone.

B.

A source quench packet.

C.

A FIN scan.

D.

A buffer overflow attack.

Which of the following is the most secure firewall implementation?

A.

Dual-homed host firewalls

B.

Screened-subnet firewalls

C.

Screened-host firewalls

D.

Packet-filtering firewalls

Which type of attack involves the alteration of a packet at the IP level to convince a system that it is communicating with a known entity in order to gain access to a system?

A.

TCP sequence number attack

B.

IP spoofing attack

C.

Piggybacking attack

D.

Teardrop attack