Systems Security Certified Practitioner (SSCP ) Quiz Questions and Answers

Susan has been alerted that applications on the network are executing very slowly. Which type of attack uses more than one computer to attack network devices with a result of slowing the network down?

Answer :
  • DDoS

Which of the following best describes the use of passwords for access control?

Answer :
  • Authentication

What is the difference between a synchronous and asynchronous password token?

Answer :
  • Synchronous tokens are generated with the use of a timer, while asynchronous tokens do not use a clock for generation.

A customer wants to keep cost to a minimum and has ordered only a single static IP address from the ISP. Which of the following must be configured on the router to allow for all the computers to share the same public IP address?

Answer :
  • Port Address Translation (PAT)

What does it mean to say that sensitivity labels are "incomparable"?

Answer :
  • Neither label contains all the categories of the other.

Which of the following is true about Kerberos?

Answer :
  • It depends upon symmetric ciphers.

What is Kerberos?

Answer :
  • A trusted third-party authentication protocol.

The three classic ways of authenticating yourself to the computer security software are by something you know, by something you have, and by something:

Answer :
  • you are.

A confidential number used as an authentication factor to verify a user's identity is called a:

Answer :
  • PIN

Which of the following exemplifies proper separation of duties?

Answer :
  • Operators are not permitted to modify the system time