Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 6 out of 14 pages
Viewing questions 101-120 out of questions
Questions # 101:

Which of the following virus types changes some of its characteristics as it spreads?

Options:

A.

Boot Sector


B.

Parasitic


C.

Stealth


D.

Polymorphic


Expert Solution
Questions # 102:

Crackers today are MOST often motivated by their desire to:

Options:

A.

Help the community in securing their networks.


B.

Seeing how far their skills will take them.


C.

Getting recognition for their actions.


D.

Gaining Money or Financial Gains.


Expert Solution
Questions # 103:

What is malware that can spread itself over open network connections?

Options:

A.

Worm


B.

Rootkit


C.

Adware


D.

Logic Bomb


Expert Solution
Questions # 104:

What do the ILOVEYOU and Melissa virus attacks have in common?

Options:

A.

They are both denial-of-service (DOS) attacks.


B.

They have nothing in common.


C.

They are both masquerading attacks.


D.

They are both social engineering attacks.


Expert Solution
Questions # 105:

Which of the following would be used to detect and correct errors so that integrity and confidentiality of transactions over networks may be maintained while preventing unauthorize interception of the traffic?

Options:

A.

Information security


B.

Server security


C.

Client security


D.

Communications security


Expert Solution
Questions # 106:

Which cable technology refers to the CAT3 and CAT5 categories?

Options:

A.

Coaxial cables


B.

Fiber Optic cables


C.

Axial cables


D.

Twisted Pair cables


Expert Solution
Questions # 107:

Asynchronous Communication transfers data by sending:

Options:

A.

bits of data sequentially


B.

bits of data sequentially in irregular timing patterns


C.

bits of data in sync with a heartbeat or clock


D.

bits of data simultaneously


Expert Solution
Questions # 108:

A server cluster looks like a:

Options:

A.

single server from the user's point of view


B.

dual server from the user's point of view


C.

triple server from the user's point of view


D.

quardle server from the user's point of view


Expert Solution
Questions # 109:

Which of the following was designed to support multiple network types over the same serial link?

Options:

A.

Ethernet


B.

SLIP


C.

PPP


D.

PPTP


Expert Solution
Questions # 110:

Which of the following methods of providing telecommunications continuity involves the use of an alternative media?

Options:

A.

Alternative routing


B.

Diverse routing


C.

Long haul network diversity


D.

Last mile circuit protection


Expert Solution
Questions # 111:

Which of the following is an IP address that is private (i.e. reserved for internal networks, and not a valid address to use on the Internet)?

Options:

A.

192.168.42.5


B.

192.166.42.5


C.

192.175.42.5


D.

192.1.42.5


Expert Solution
Questions # 112:

What is an IP routing table?

Options:

A.

A list of IP addresses and corresponding MAC addresses.


B.

A list of station and network addresses with corresponding gateway IP address.


C.

A list of host names and corresponding IP addresses.


D.

A list of current network interfaces on which IP routing is enabled.


Expert Solution
Questions # 113:

Why is Network File System (NFS) used?

Options:

A.

It enables two different types of file systems to interoperate.


B.

It enables two different types of file systems to share Sun applications.


C.

It enables two different types of file systems to use IP/IPX.


D.

It enables two different types of file systems to emulate each other.


Expert Solution
Questions # 114:

Which of the following is true about link encryption?

Options:

A.

Each entity has a common key with the destination node.


B.

Encrypted messages are only decrypted by the final node.


C.

This mode does not provide protection if anyone of the nodes along the transmission path is compromised.


D.

Only secure nodes are used in this type of transmission.


Expert Solution
Questions # 115:

Proxies works by transferring a copy of each accepted data packet from one network to another, thereby masking the:

Options:

A.

data's payload


B.

data's details


C.

data's owner


D.

data's origin


Expert Solution
Questions # 116:

The Logical Link Control sub-layer is a part of which of the following?

Options:

A.

The ISO/OSI Data Link layer


B.

The Reference monitor


C.

The Transport layer of the TCP/IP stack model


D.

Change management control


Expert Solution
Questions # 117:

Which of the following are WELL KNOWN PORTS assigned by the IANA?

Options:

A.

Ports 0 to 255


B.

Ports 0 to 1024


C.

Ports 0 to 1023


D.

Ports 0 to 127


Expert Solution
Questions # 118:

Which of the following service is a distributed database that translate host name to IP address to IP address to host name?

Options:

A.

DNS


B.

FTP


C.

SSH


D.

SMTP


Expert Solution
Questions # 119:

In this type of attack, the intruder re-routes data traffic from a network device to a personal machine. This diversion allows an attacker to gain access to critical resources and user credentials, such as passwords, and to gain unauthorized access to critical systems of an organization. Pick the best choice below.

Options:

A.

Network Address Translation


B.

Network Address Hijacking


C.

Network Address Supernetting


D.

Network Address Sniffing


Expert Solution
Questions # 120:

How would an IP spoofing attack be best classified?

Options:

A.

Session hijacking attack


B.

Passive attack


C.

Fragmentation attack


D.

Sniffing attack


Expert Solution
Viewing page 6 out of 14 pages
Viewing questions 101-120 out of questions