Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ISC SSCP - Systems Security Certified Practitioner

Page: 1 / 14
Total 1074 questions

Which of the following is a cryptographic protocol and infrastructure developed to send encrypted credit card numbers over the Internet?

A.

Secure Electronic Transaction (SET)

B.

MONDEX

C.

Secure Shell (SSH-2)

D.

Secure Hypertext Transfer Protocol (S-HTTP)

In which phase of Internet Key Exchange (IKE) protocol is peer authentication performed?

A.

Pre Initialization Phase

B.

Phase 1

C.

Phase 2

D.

No peer authentication is performed

Which of the following is true about Kerberos?

A.

It utilizes public key cryptography.

B.

It encrypts data after a ticket is granted, but passwords are exchanged in plain text.

C.

It depends upon symmetric ciphers.

D.

It is a second party authentication system.

What kind of certificate is used to validate a user identity?

A.

Public key certificate

B.

Attribute certificate

C.

Root certificate

D.

Code signing certificate

Which of the following is NOT a symmetric key algorithm?

A.

Blowfish

B.

Digital Signature Standard (DSS)

C.

Triple DES (3DES)

D.

RC5

Which of the following statements pertaining to Secure Sockets Layer (SSL) is false?

A.

The SSL protocol was developed by Netscape to secure Internet client-server transactions.

B.

The SSL protocol's primary use is to authenticate the client to the server using public key cryptography and digital certificates.

C.

Web pages using the SSL protocol start with HTTPS

D.

SSL can be used with applications such as Telnet, FTP and email protocols.

Which of the following is NOT a property of the Rijndael block cipher algorithm?

A.

The key sizes must be a multiple of 32 bits

B.

Maximum block size is 256 bits

C.

Maximum key size is 512 bits

D.

The key size does not have to match the block size

What algorithm has been selected as the AES algorithm, replacing the DES algorithm?

A.

RC6

B.

Twofish

C.

Rijndael

D.

Blowfish

In a known plaintext attack, the cryptanalyst has knowledge of which of the following?

A.

the ciphertext and the key

B.

the plaintext and the secret key

C.

both the plaintext and the associated ciphertext of several messages

D.

the plaintext and the algorithm

Which of the following identifies the encryption algorithm selected by NIST for the new Advanced Encryption Standard?

A.

Twofish

B.

Serpent

C.

RC6

D.

Rijndael

Which of the following is not a one-way hashing algorithm?

A.

MD2

B.

RC4

C.

SHA-1

D.

HAVAL

You work in a police department forensics lab where you examine computers for evidence of crimes. Your work is vital to the success of the prosecution of criminals.

One day you receive a laptop and are part of a two man team responsible for examining it together. However, it is lunch time and after receiving the laptop you leave it on your desk and you both head out to lunch.

What critical step in forensic evidence have you forgotten?

A.

Chain of custody

B.

Locking the laptop in your desk

C.

Making a disk image for examination

D.

Cracking the admin password with chntpw

What is the name of the protocol use to set up and manage Security Associations (SA) for IP Security (IPSec)?

A.

Internet Key Exchange (IKE)

B.

Secure Key Exchange Mechanism

C.

Oakley

D.

Internet Security Association and Key Management Protocol

Which of the following is a symmetric encryption algorithm?

A.

RSA

B.

Elliptic Curve

C.

RC5

D.

El Gamal

Cryptography does NOT help in:

A.

Detecting fraudulent insertion.

B.

Detecting fraudulent deletion.

C.

Detecting fraudulent modification.

D.

Detecting fraudulent disclosure.

What can be defined as an instance of two different keys generating the same ciphertext from the same plaintext?

A.

Key collision

B.

Key clustering

C.

Hashing

D.

Ciphertext collision

Which of the following is not a property of the Rijndael block cipher algorithm?

A.

It employs a round transformation that is comprised of three layers of distinct and invertible transformations.

B.

It is suited for high speed chips with no area restrictions.

C.

It operates on 64-bit plaintext blocks and uses a 128 bit key.

D.

It could be used on a smart card.

The RSA Algorithm uses which mathematical concept as the basis of its encryption?

A.

Geometry

B.

16-round ciphers

C.

PI (3.14159...)

D.

Two large prime numbers

PGP uses which of the following to encrypt data?

A.

An asymmetric encryption algorithm

B.

A symmetric encryption algorithm

C.

A symmetric key distribution system

D.

An X.509 digital certificate

What is the length of an MD5 message digest?

A.

128 bits

B.

160 bits

C.

256 bits

D.

varies depending upon the message size.