Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

ISC SSCP Exam Made Easy: Step-by-Step Preparation Guide

Questions 141

How long are IPv4 addresses?

Options:

A.

32 bits long.

B.

64 bits long.

C.

128 bits long.

D.

16 bits long.

Buy Now
Questions 142

One of the following statements about the differences between PPTP and L2TP is NOT true

Options:

A.

PPTP can run only on top of IP networks.

B.

PPTP is an encryption protocol and L2TP is not.

C.

L2TP works well with all firewalls and network devices that perform NAT.

D.

L2TP supports AAA servers

Buy Now
Questions 143

Which of the following is a method of multiplexing data where a communication channel is divided into an arbitrary number of variable bit-rate digital channels or data streams. This method allocates bandwidth dynamically to physical channels having information to transmit?

Options:

A.

Time-division multiplexing

B.

Asynchronous time-division multiplexing

C.

Statistical multiplexing

D.

Frequency division multiplexing

Buy Now
Questions 144

The concept of best effort delivery is best associated with?

Options:

A.

TCP

B.

HTTP

C.

RSVP

D.

IP

Buy Now
Questions 145

Telnet and rlogin use which protocol?

Options:

A.

UDP.

B.

SNMP.

C.

TCP.

D.

IGP.

Buy Now
Questions 146

Which of the following ports does NOT normally need to be open for a mail server to operate?

Options:

A.

Port 110

B.

Port 25

C.

Port 119

D.

Port 143

Buy Now
Questions 147

Which of the following protocols' primary function is to send messages between network devices regarding the health of the network?

Options:

A.

Reverse Address Resolution Protocol (RARP).

B.

Address Resolution Protocol (ARP).

C.

Internet Protocol (IP).

D.

Internet Control Message protocol (ICMP).

Buy Now
Questions 148

Which of the following media is MOST resistant to tapping?

Options:

A.

microwave.

B.

twisted pair.

C.

coaxial cable.

D.

fiber optic.

Buy Now
Questions 149

Which of the following NAT firewall translation modes offers no protection from hacking attacks to an internal host using this functionality?

Options:

A.

Network redundancy translation

B.

Load balancing translation

C.

Dynamic translation

D.

Static translation

Buy Now
Questions 150

Which of the following is NOT an advantage that TACACS+ has over TACACS?

Options:

A.

Event logging

B.

Use of two-factor password authentication

C.

User has the ability to change his password

D.

Ability for security tokens to be resynchronized

Buy Now
Questions 151

Which IPSec operational mode encrypts the entire data packet (including header and data) into an IPSec packet?

Options:

A.

Authentication mode

B.

Tunnel mode

C.

Transport mode

D.

Safe mode

Buy Now
Questions 152

Address Resolution Protocol (ARP) interrogates the network by sending out a?

Options:

A.

broadcast.

B.

multicast.

C.

unicast.

D.

semicast.

Buy Now
Questions 153

What is called an attack in which an attacker floods a system with connection requests but does not respond when the target system replies to those requests?

Options:

A.

Ping of death attack

B.

SYN attack

C.

Smurf attack

D.

Buffer overflow attack

Buy Now
Questions 154

Which of the following should NOT normally be allowed through a firewall?

Options:

A.

SNMP

B.

SMTP

C.

HTTP

D.

SSH

Buy Now
Questions 155

Which of the following was developed as a simple mechanism for allowing simple network terminals to load their operating system from a server over the LAN?

Options:

A.

DHCP

B.

BootP

C.

DNS

D.

ARP

Buy Now
Questions 156

Proxies works by transferring a copy of each accepted data packet from one network to another, thereby masking the:

Options:

A.

data's payload

B.

data's details

C.

data's owner

D.

data's origin

Buy Now
Questions 157

You have been tasked to develop an effective information classification program. Which one of the following steps should be performed first?

Options:

A.

Establish procedures for periodically reviewing the classification and ownership

B.

Specify the security controls required for each classification level

C.

Identify the data custodian who will be responsible for maintaining the security level of data

D.

Specify the criteria that will determine how data is classified

Buy Now
Questions 158

Which port does the Post Office Protocol Version 3 (POP3) make use of?

Options:

A.

110

B.

109

C.

139

D.

119

Buy Now
Questions 159

In a stateful inspection firewall, data packets are captured by an inspection engine that is operating at the:

Options:

A.

Network or Transport Layer.

B.

Application Layer.

C.

Inspection Layer.

D.

Data Link Layer.

Buy Now
Questions 160

Which layer of the TCP/IP protocol stack corresponds to the ISO/OSI Network layer (layer 3)?

Options:

A.

Host-to-host layer

B.

Internet layer

C.

Network access layer

D.

Session layer

Buy Now