Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Systems Security Certified Practitioner

Last Update 18 hours ago Total Questions : 1074

The Systems Security Certified Practitioner content is now fully updated, with all current exam questions added 18 hours ago. Deciding to include SSCP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our SSCP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these SSCP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Systems Security Certified Practitioner practice test comfortably within the allotted time.

Question # 221

Which of the following would best define a digital envelope?

A.

A message that is encrypted and signed with a digital certificate.

B.

A message that is signed with a secret key and encrypted with the sender ' s private key.

C.

A message encrypted with a secret key attached with the message. The secret key is encrypted with the public key of the receiver.

D.

A message that is encrypted with the recipient ' s public key and signed with the sender ' s private key.

Question # 222

How many rounds are used by DES?

A.

16

B.

32

C.

64

D.

48

Question # 223

Which of the following is the most secure form of triple-DES encryption?

A.

DES-EDE3

B.

DES-EDE1

C.

DES-EEE4

D.

DES-EDE2

Question # 224

What algorithm has been selected as the AES algorithm, replacing the DES algorithm?

A.

RC6

B.

Twofish

C.

Rijndael

D.

Blowfish

Question # 225

Which of the following standards concerns digital certificates?

A.

X.400

B.

X.25

C.

X.509

D.

X.75

Question # 226

Which type of encryption is considered to be unbreakable if the stream is truly random and is as large as the plaintext and never reused in whole or part?

A.

One Time Pad (OTP)

B.

One time Cryptopad (OTC)

C.

Cryptanalysis

D.

Pretty Good Privacy (PGP)

Question # 227

Which of the following service is not provided by a public key infrastructure (PKI)?

A.

Access control

B.

Integrity

C.

Authentication

D.

Reliability

Question # 228

What can be defined as secret communications where the very existence of the message is hidden?

A.

Clustering

B.

Steganography

C.

Cryptology

D.

Vernam cipher

Question # 229

How many bits is the effective length of the key of the Data Encryption Standard algorithm?

A.

168

B.

128

C.

56

D.

64

Question # 230

Which of the following is NOT a property of the Rijndael block cipher algorithm?

A.

The key sizes must be a multiple of 32 bits

B.

Maximum block size is 256 bits

C.

Maximum key size is 512 bits

D.

The key size does not have to match the block size

Question # 231

The Secure Hash Algorithm (SHA-1) creates:

A.

a fixed length message digest from a fixed length input message

B.

a variable length message digest from a variable length input message

C.

a fixed length message digest from a variable length input message

D.

a variable length message digest from a fixed length input message

Question # 232

Which of the following is NOT a property of a one-way hash function?

A.

It converts a message of a fixed length into a message digest of arbitrary length.

B.

It is computationally infeasible to construct two different messages with the same digest.

C.

It converts a message of arbitrary length into a message digest of a fixed length.

D.

Given a digest value, it is computationally infeasible to find the corresponding message.

Question # 233

Which of the following terms can be described as the process to conceal data into another file or media in a practice known as security through obscurity?

A.

Steganography

B.

ADS - Alternate Data Streams

C.

Encryption

D.

NTFS ADS

Question # 234

Which of the following was developed in order to protect against fraud in electronic fund transfers (EFT) by ensuring the message comes from its claimed originator and that it has not been altered in transmission?

A.

Secure Electronic Transaction (SET)

B.

Message Authentication Code (MAC)

C.

Cyclic Redundancy Check (CRC)

D.

Secure Hash Standard (SHS)

Question # 235

Which of the following is NOT an asymmetric key algorithm?

A.

RSA

B.

Elliptic Curve Cryptosystem (ECC)

C.

El Gamal

D.

Data Encryption System (DES)

Question # 236

What is used to bind a document to its creation at a particular time?

A.

Network Time Protocol (NTP)

B.

Digital Signature

C.

Digital Timestamp

D.

Certification Authority (CA)

Question # 237

What can be defined as a digital certificate that binds a set of descriptive data items, other than a public key, either directly to a subject name or to the identifier of another certificate that is a public-key certificate?

A.

A public-key certificate

B.

An attribute certificate

C.

A digital certificate

D.

A descriptive certificate

Question # 238

What is the RESULT of a hash algorithm being applied to a message ?

A.

A digital signature

B.

A ciphertext

C.

A message digest

D.

A plaintext

Question # 239

Which of the following statements pertaining to block ciphers is incorrect?

A.

It operates on fixed-size blocks of plaintext.

B.

It is more suitable for software than hardware implementations.

C.

Plain text is encrypted with a public key and decrypted with a private key.

D.

Some Block ciphers can operate internally as a stream.

Question # 240

Which of the following is more suitable for a hardware implementation?

A.

Stream ciphers

B.

Block ciphers

C.

Cipher block chaining

D.

Electronic code book

Go to page: