Pass the ISC ISC 2 Credentials SSCP Questions and answers with CertsForce

Viewing page 7 out of 14 pages
Viewing questions 121-140 out of questions
Questions # 121:

Address Resolution Protocol (ARP) interrogates the network by sending out a?

Options:

A.

broadcast.


B.

multicast.


C.

unicast.


D.

semicast.


Expert Solution
Questions # 122:

Which of the following firewall rules found on a firewall installed between an organization's internal network and the Internet would present the greatest danger to the internal network?

Options:

A.

Permit all traffic between local hosts.


B.

Permit all inbound ssh traffic.


C.

Permit all inbound tcp connections.


D.

Permit all syslog traffic to log-server.abc.org.


Expert Solution
Questions # 123:

Which OSI/ISO layer is the Media Access Control (MAC) sublayer part of?

Options:

A.

Transport layer


B.

Network layer


C.

Data link layer


D.

Physical layer


Expert Solution
Questions # 124:

Which OSI/ISO layer does a SOCKS server operate at?

Options:

A.

Session layer


B.

Transport layer


C.

Network layer


D.

Data link layer


Expert Solution
Questions # 125:

What is the proper term to refer to a single unit of Ethernet data at the link layer of the DoD TCP model ?

Options:

A.

Ethernet Segment.


B.

Ethernet Datagram.


C.

Ethernet Frame.


D.

Ethernet Packet.


Expert Solution
Questions # 126:

Which of the following protocols operates at the session layer (layer 5)?

Options:

A.

RPC


B.

IGMP


C.

LPD


D.

SPX


Expert Solution
Questions # 127:

Packet Filtering Firewalls can also enable access for:

Options:

A.

only authorized application port or service numbers.


B.

only unauthorized application port or service numbers.


C.

only authorized application port or ex-service numbers.


D.

only authorized application port or service integers.


Expert Solution
Questions # 128:

A group of independent servers, which are managed as a single system, that provides higher availability, easier manageability, and greater scalability is:

Options:

A.

server cluster


B.

client cluster


C.

guest cluster


D.

host cluster


Expert Solution
Questions # 129:

Which of the following does NOT use token-passing?

Options:

A.

ARCnet


B.

FDDI


C.

Token-ring


D.

IEEE 802.3


Expert Solution
Questions # 130:

What is defined as the manner in which the network devices are organized to facilitate communications?

Options:

A.

LAN transmission methods


B.

LAN topologies


C.

LAN transmission protocols


D.

LAN media access methods


Expert Solution
Questions # 131:

Which of the following is the most secure firewall implementation?

Options:

A.

Dual-homed host firewalls


B.

Screened-subnet firewalls


C.

Screened-host firewalls


D.

Packet-filtering firewalls


Expert Solution
Questions # 132:

Good security is built on which of the following concept?

Options:

A.

The concept of a pass-through device that only allows certain traffic in and out


B.

The Concept of defense in depth


C.

The Concept of Preventative controls


D.

The Concept of Defensive Controls


Expert Solution
Questions # 133:

Which of the following networking devices allows the connection of two or more homogeneous LANs in a simple way where they forward the traffic based on the MAC address ?

Options:

A.

Gateways


B.

Routers


C.

Bridges


D.

Firewalls


Expert Solution
Questions # 134:

Which of the following are REGISTERED PORTS as defined by IANA ?

Options:

A.

Ports 128 to 255


B.

Ports 1024 to 49151


C.

Ports 1025 to 65535


D.

Ports 1024 to 32767


Expert Solution
Questions # 135:

The IP header contains a protocol field. If this field contains the value of 1, what type of data is contained within the IP datagram?

Options:

A.

TCP.


B.

ICMP.


C.

UDP.


D.

IGMP.


Expert Solution
Questions # 136:

Which of the following was designed as a more fault-tolerant topology than Ethernet, and very resilient when properly implemented?

Options:

A.

Token Link.


B.

Token system.


C.

Token Ring.


D.

Duplicate ring.


Expert Solution
Questions # 137:

Which of the following is an IP address that is private (i.e. reserved for internal networks, and not a valid address to use on the Internet)?

Options:

A.

10.0.42.5


B.

11.0.42.5


C.

12.0.42.5


D.

13.0.42.5


Expert Solution
Questions # 138:

Why is infrared generally considered to be more secure to eavesdropping than multidirectional radio transmissions?

Options:

A.

Because infrared eavesdropping requires more sophisticated equipment.


B.

Because infrared operates only over short distances.


C.

Because infrared requires direct line-of-sight paths.


D.

Because infrared operates at extra-low frequencies (ELF).


Expert Solution
Questions # 139:

Which of the following is defined as a key establishment protocol based on the Diffie-Hellman algorithm proposed for IPsec but superseded by IKE?

Options:

A.

Diffie-Hellman Key Exchange Protocol


B.

Internet Security Association and Key Management Protocol (ISAKMP)


C.

Simple Key-management for Internet Protocols (SKIP)


D.

OAKLEY


Expert Solution
Questions # 140:

What is the name of the third party authority that vouches for the binding between the data items in a digital certificate?

Options:

A.

Registration authority


B.

Certification authority


C.

Issuing authority


D.

Vouching authority


Expert Solution
Viewing page 7 out of 14 pages
Viewing questions 121-140 out of questions