FREE SSCP Certification I Questions and Answers
Which of the following items is most frequently used for identification and is not appropriate for use as an authenticator?
A retinal scan is a biometric identification method that uses unique patterns of blood vessels in the retina to identify individuals. It is primarily used for identification purposes, such as in security systems, but it is not typically used as an authenticator. An authenticator is a method used to verify an individual's identity trying to access a system or resource.
Sam wants to test the password security on a vulnerable Linux system using John the Ripper. What documents is he going to require to do this analysis?
John the Ripper is a popular password cracking tool used for testing the security of passwords. On a Linux system, the password-related information is stored in the /etc/passwd and /etc/shadow files.
To cut down on the price of running a public-facing web server, Sherra is thinking of using a self-signed certificate. What is the main danger connected to using certificates that were self-signed?
Self-signed certificates are certificates that are signed by the entity they belong to, rather than being signed by a trusted third-party certificate authority (CA). The primary risk associated with the use of self-signed certificates is that they are not trusted by default.
Which of the following is an illustration of hardening physical infrastructure?
Physical infrastructure hardening refers to measures taken to strengthen the security and resilience of physical components of an organization's infrastructure. It involves implementing safeguards to protect physical assets from threats such as natural disasters, physical attacks, or accidents.
Recently, Ceasar put into place an intrusion prevention system meant to prevent typical network threats from harming his business. What kind of risk management approach is Ceasar employing?
Risk mitigation is a risk management strategy that involves taking actions to reduce or mitigate the impact or likelihood of risks. In this case, Mike implemented an intrusion prevention system (IPS) to block common network attacks from affecting his organization. The IPS is a proactive measure that aims to detect and prevent network attacks before they can cause damage or compromise the network. By implementing the IPS, Mike is pursuing a risk mitigation strategy to reduce the risk associated with network attacks.
Recently, Jane discovered a security problem happening on her network. What should she do right now that should be her top priority?
When a security incident is detected in progress on a network, the highest priority for Tara should be containment. Containment involves taking immediate actions to isolate and limit the impact of the security incident. The goal is to prevent further spread of the incident within the network and minimize potential damage.
Which architecture best encapsulates Ethernet?
Ethernet uses a bus topology, which means that all devices on the network are connected to a single shared communication line, called the Ethernet cable or Ethernet bus. Each device on the network can send and receive data on this shared medium.