Black Friday Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

ISC SSCP Exam Made Easy: Step-by-Step Preparation Guide

Questions 161

Which type of attack involves the alteration of a packet at the IP level to convince a system that it is communicating with a known entity in order to gain access to a system?

Options:

A.

TCP sequence number attack

B.

IP spoofing attack

C.

Piggybacking attack

D.

Teardrop attack

Buy Now
Questions 162

Which of the following is NOT a characteristic or shortcoming of packet filtering gateways?

Options:

A.

The source and destination addresses, protocols, and ports contained in the IP packet header are the only information that is available to the router in making a decision whether or not to permit traffic access to an internal network.

B.

They don't protect against IP or DNS address spoofing.

C.

They do not support strong user authentication.

D.

They are appropriate for medium-risk environment.

Buy Now
Questions 163

Which of the following statements pertaining to firewalls is incorrect?

Options:

A.

Firewalls create bottlenecks between the internal and external network.

B.

Firewalls allow for centralization of security services in machines optimized and dedicated to the task.

C.

Firewalls protect a network at all layers of the OSI models.

D.

Firewalls are used to create security checkpoints at the boundaries of private networks.

Buy Now
Questions 164

How would an IP spoofing attack be best classified?

Options:

A.

Session hijacking attack

B.

Passive attack

C.

Fragmentation attack

D.

Sniffing attack

Buy Now
Questions 165

Which ISO/OSI layer establishes the communications link between individual devices over a physical link or channel?

Options:

A.

Transport layer

B.

Network layer

C.

Data link layer

D.

Physical layer

Buy Now
Questions 166

In a SSL session between a client and a server, who is responsible for generating the master secret that will be used as a seed to generate the symmetric keys that will be used during the session?

Options:

A.

Both client and server

B.

The client's browser

C.

The web server

D.

The merchant's Certificate Server

Buy Now
Questions 167

FTP, TFTP, SNMP, and SMTP are provided at what level of the Open Systems Interconnect (OSI) Reference Model?

Options:

A.

Application

B.

Network

C.

Presentation

D.

Transport

Buy Now
Questions 168

Which of the following transmission media would NOT be affected by cross talk or interference?

Options:

A.

Copper cable

B.

Radio System

C.

Satellite radiolink

D.

Fiber optic cables

Buy Now
Questions 169

Which of the following remote access authentication systems is the most robust?

Options:

A.

TACACS+

B.

RADIUS

C.

PAP

D.

TACACS

Buy Now
Questions 170

Why is infrared generally considered to be more secure to eavesdropping than multidirectional radio transmissions?

Options:

A.

Because infrared eavesdropping requires more sophisticated equipment.

B.

Because infrared operates only over short distances.

C.

Because infrared requires direct line-of-sight paths.

D.

Because infrared operates at extra-low frequencies (ELF).

Buy Now
Questions 171

Which of the following statements pertaining to VPN protocol standards is false?

Options:

A.

L2TP is a combination of PPTP and L2F.

B.

L2TP and PPTP were designed for single point-to-point client to server communication.

C.

L2TP operates at the network layer.

D.

PPTP uses native PPP authentication and encryption services.

Buy Now
Questions 172

What attack involves the perpetrator sending spoofed packet(s) wich contains the same destination and source IP address as the remote host, the same port for the source and destination, having the SYN flag, and targeting any open ports that are open on the remote host?

Options:

A.

Boink attack

B.

Land attack

C.

Teardrop attack

D.

Smurf attack

Buy Now
Questions 173

Which of the following DoD Model layer provides non-repudiation services?

Options:

A.

network layer.

B.

application layer.

C.

transport layer.

D.

data link layer.

Buy Now
Questions 174

When an outgoing request is made on a port number greater than 1023, this type of firewall creates an ACL to allow the incoming reply on that port to pass:

Options:

A.

packet filtering

B.

CIrcuit level proxy

C.

Dynamic packet filtering

D.

Application level proxy

Buy Now
Questions 175

What ISO/OSI layer do switches primarily operate at?

Do take note that this question makes reference to a plain vanilla switch and not one of the smart switches that is available on the market today.

Options:

A.

Physical layer

B.

Network layer

C.

Data link layer

D.

Session layer

Buy Now
Questions 176

What is a TFTP server most useful for?

Options:

A.

Transferring configurations to and from network devices.

B.

Transferring files to web servers.

C.

Terminal access to network devices.

D.

Terminal access to file servers.

Buy Now
Questions 177

Which of the following is an IP address that is private (i.e. reserved for internal networks, and not a valid address to use on the Internet)?

Options:

A.

192.168.42.5

B.

192.166.42.5

C.

192.175.42.5

D.

192.1.42.5

Buy Now
Questions 178

Which of the following can best eliminate dial-up access through a Remote Access Server as a hacking vector?

Options:

A.

Using a TACACS+ server.

B.

Installing the Remote Access Server outside the firewall and forcing legitimate users to authenticate to the firewall.

C.

Setting modem ring count to at least 5.

D.

Only attaching modems to non-networked hosts.

Buy Now
Questions 179

What is the primary reason why some sites choose not to implement Trivial File Transfer Protocol (TFTP)?

Options:

A.

It is too complex to manage user access restrictions under TFTP

B.

Due to the inherent security risks

C.

It does not offer high level encryption like FTP

D.

It cannot support the Lightwight Directory Access Protocol (LDAP)

Buy Now
Questions 180

The IP header contains a protocol field. If this field contains the value of 1, what type of data is contained within the IP datagram?

Options:

A.

TCP.

B.

ICMP.

C.

UDP.

D.

IGMP.

Buy Now