Systems Security Certified Practitioner (SSCP ) Quiz Questions and Answers

Susan has been alerted that applications on the network are executing very slowly. Which type of attack uses more than one computer to attack network devices with a result of slowing the network down?

Answer :
  • DDoS

Which of the following best describes the use of passwords for access control?

Answer :
  • Authentication

What is the difference between a synchronous and asynchronous password token?

Answer :
  • Synchronous tokens are generated with the use of a timer, while asynchronous tokens do not use a clock for generation.

What does it mean to say that sensitivity labels are "incomparable "?

Answer :
  • Neither label contains all the categories of the other.

What is Kerberos?

Answer :
  • A trusted third-party authentication protocol.

A confidential number used as an authentication factor to verify a user's identity is called a:

Answer :
  • PIN

Which of the following exemplifies proper separation of duties?

Answer :
  • Operators are not permitted to modify the system time

Which of the following would assist the most in Host Based intrusion detection?

Answer :
  • audit trails.

Controls to keep password sniffing attacks from compromising computer systems include which of the following?

Answer :
  • one-time passwords and encryption.

Kerberos can prevent which one of the following attacks?

Answer :
  • playback (replay) attack.