Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Pass Using SSCP Exam Dumps

Page: 8 / 35
Total 1074 questions

Systems Security Certified Practitioner Questions and Answers

Question 29

Which of the following algorithms does NOT provide hashing?

Options:

A.

SHA-1

B.

MD2

C.

RC4

D.

MD5

Question 30

When we encrypt or decrypt data there is a basic operation involving ones and zeros where they are compared in a process that looks something like this:

0101 0001 Plain text

0111 0011 Key stream

0010 0010 Output

What is this cryptographic operation called?

Options:

A.

Exclusive-OR

B.

Bit Swapping

C.

Logical-NOR

D.

Decryption

Question 31

Public Key Infrastructure (PKI) uses asymmetric key encryption between parties. The originator encrypts information using the intended recipient's "public" key in order to get confidentiality of the data being sent. The recipients use their own "private" key to decrypt the information. The "Infrastructure" of this methodology ensures that:

Options:

A.

The sender and recipient have reached a mutual agreement on the encryption key exchange that they will use.

B.

The channels through which the information flows are secure.

C.

The recipient's identity can be positively verified by the sender.

D.

The sender of the message is the only other person with access to the recipient's private key.

Question 32

Which of the following terms can be described as the process to conceal data into another file or media in a practice known as security through obscurity?

Options:

A.

Steganography

B.

ADS - Alternate Data Streams

C.

Encryption

D.

NTFS ADS

Page: 8 / 35
Total 1074 questions