Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC SSCP - Systems Security Certified Practitioner

Page: 9 / 14
Total 1074 questions

Which of the following rules appearing in an Internet firewall policy is inappropriate?

A.

Source routing shall be disabled on all firewalls and external routers.

B.

Firewalls shall be configured to transparently allow all outbound and inbound services.

C.

Firewalls should fail to a configuration that denies all services, and require a firewall administrator to re-enable services after a firewall has failed.

D.

Firewalls shall not accept traffic on its external interfaces that appear to be coming from internal network addresses.

Each data packet is assigned the IP address of the sender and the IP address of the:

A.

recipient.

B.

host.

C.

node.

D.

network.

Which of the following is NOT an advantage that TACACS+ has over TACACS?

A.

Event logging

B.

Use of two-factor password authentication

C.

User has the ability to change his password

D.

Ability for security tokens to be resynchronized

A proxy is considered a:

A.

first generation firewall.

B.

third generation firewall.

C.

second generation firewall.

D.

fourth generation firewall.

Why is Network File System (NFS) used?

A.

It enables two different types of file systems to interoperate.

B.

It enables two different types of file systems to share Sun applications.

C.

It enables two different types of file systems to use IP/IPX.

D.

It enables two different types of file systems to emulate each other.

Which of the following NAT firewall translation modes offers no protection from hacking attacks to an internal host using this functionality?

A.

Network redundancy translation

B.

Load balancing translation

C.

Dynamic translation

D.

Static translation

Which OSI/ISO layer is the Media Access Control (MAC) sublayer part of?

A.

Transport layer

B.

Network layer

C.

Data link layer

D.

Physical layer

Domain Name Service is a distributed database system that is used to map:

A.

Domain Name to IP addresses.

B.

MAC addresses to domain names.

C.

MAC Address to IP addresses.

D.

IP addresses to MAC Addresses.

Which of the following can prevent hijacking of a web session?

A.

RSA

B.

SET

C.

SSL

D.

PPP

Secure Shell (SSH-2) provides all the following services except:

A.

secure remote login

B.

command execution

C.

port forwarding

D.

user authentication

The IP header contains a protocol field. If this field contains the value of 17, what type of data is contained within the ip datagram?

A.

TCP.

B.

ICMP.

C.

UDP.

D.

IGMP.

What is called an attack in which an attacker floods a system with connection requests but does not respond when the target system replies to those requests?

A.

Ping of death attack

B.

SYN attack

C.

Smurf attack

D.

Buffer overflow attack

Which xDSL flavour can deliver up to 52 Mbps downstream over a single copper twisted pair?

A.

VDSL

B.

SDSL

C.

HDSL

D.

ADSL

Which xDSL flavour, appropriate for home or small offices, delivers more bandwidth downstream than upstream and over longer distance?

A.

VDSL

B.

SDSL

C.

ADSL

D.

HDSL

Which of the following is TRUE regarding Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?

A.

TCP is connection-oriented, UDP is not.

B.

UDP provides for Error Correction, TCP does not.

C.

UDP is useful for longer messages, rather than TCP.

D.

TCP does not guarantee delivery of data, while UDP does guarantee data delivery.

Which of the following protocols is designed to send individual messages securely?

A.

Kerberos

B.

Secure Electronic Transaction (SET).

C.

Secure Sockets Layer (SSL).

D.

Secure HTTP (S-HTTP).

Secure Shell (SSH) is a strong method of performing:

A.

client authentication

B.

server authentication

C.

host authentication

D.

guest authentication

Which of the following best defines source routing?

A.

The packets hold the forwarding information so they don't need to let bridges and routers decide what is the best route or way to get to the destination.

B.

The packets hold source information in a fashion that source address cannot be forged.

C.

The packets are encapsulated to conceal source information.

D.

The packets hold information about redundant paths in order to provide a higher reliability.

Which of the following is a token-passing scheme like token ring that also has a second ring that remains dormant until an error condition is detected on the primary ring?

A.

Fiber Distributed Data Interface (FDDI).

B.

Ethernet

C.

Fast Ethernet

D.

Broadband

What can best be defined as a strongly protected computer that is in a network protected by a firewall (or is part of a firewall) and is the only host (or one of only a few hosts) in the network that can be directly accessed from networks on the other side of the firewall?

A.

A bastion host

B.

A screened subnet

C.

A dual-homed host

D.

A proxy server