ISC2 - Celebrate 2025 with Discount Offer - Ends In 1d 00h 00m 00s Coupon code: Y2530OFF
  1. Home
  2. ISC2
  3. SSCP Dumps
  4. Free SSCP Questions

Free Practice Questions for ISC2 SSCP Exam

Pass4Future also provide interactive practice exam software for preparing ISC2 Systems Security Certified Practitioner (SSCP) Exam effectively. You are welcome to explore sample free ISC2 SSCP Exam questions below and also try ISC2 SSCP Exam practice test software.

Page:    1 / 14   
Total 1074 questions

Question 1

At which OSI/ISO layer is an encrypted authentication between a client software package and a firewall performed?



Answer : C

Encrypted authentication is a firewall feature that allows users on an external network to authenticate themselves to prove that they are authorized to access resources on the internal network. Encrypted authentication is convenient because it happens at the transport layer between a client software and a firewall, allowing all normal application software to run without hindrance.

Source: STREBE, Matthew and PERKINS, Charles, Firewalls 24seven, Sybex 2000, Chapter 1: Understanding Firewalls.


Question 2

Which of the following is the primary reason why a user would choose a dial-up modem connection to the Internet when they have a faster, secure Internet connection through the organization's network?



Answer : D

All the choices above represent examples of circumventing the organization's security policy, which is the primary reason why a user would be using a dial-up Internet connection when a secure connection is available through the organization's network.

Source: STREBE, Matthew and PERKINS, Charles, Firewalls 24seven, Sybex 2000, Chapter 1: Understanding Firewalls.


Question 3

Which of the following can best eliminate dial-up access through a Remote Access Server as a hacking vector?



Answer : B

Containing the dial-up problem is conceptually easy: by installing the Remote Access Server outside the firewall and forcing legitimate users to authenticate to the firewall, any access to internal resources through the RAS can be filtered as would any other connection coming from the Internet.

The use of a TACACS+ Server by itself cannot eliminate hacking.

Setting a modem ring count to 5 may help in defeating war-dialing hackers who look for modem by dialing long series of numbers.

Attaching modems only to non-networked hosts is not practical and would not prevent these hosts from being hacked.

Source: STREBE, Matthew and PERKINS, Charles, Firewalls 24seven, Sybex 2000, Chapter 2: Hackers.


Question 4

Which of the following was designed to support multiple network types over the same serial link?



Answer : C

The Point-to-Point Protocol (PPP) was designed to support multiple network types over the same serial link, just as Ethernet supports multiple network types over the same LAN. PPP replaces the earlier Serial Line Internet Protocol (SLIP) that only supports IP over a serial link. PPTP is a tunneling protocol.

Source: STREBE, Matthew and PERKINS, Charles, Firewalls 24seven, Sybex 2000, Chapter 3: TCP/IP from a Security Viewpoint.


Question 5

Before the advent of classless addressing, the address 128.192.168.16 would have been considered part of:



Answer : B

Before the advent of classless addressing, one could tell the size of a network by the first few bits of an IP address. If the first bit was set to zero (the first byte being from 0 to 127), the address was a class A network. Values from 128 to 191 were used for class B networks whereas values between 192 and 223 were used for class C networks. Class D, with values from 224 to 239 (the first three bits set to one and the fourth to zero), was reserved for IP multicast.

Source: STREBE, Matthew and PERKINS, Charles, Firewalls 24seven, Sybex 2000, Chapter 3: TCP/IP from a Security Viewpoint.


Page:    1 / 14   
Total 1074 questions