SET 9 SSCP practice questions WGU
C845
Which of the following type of cryptography is used when both parties use the same key
to communicate securely with each other?
A. Symmetric Key Cryptography
B. PKI - Public Key Infrastructure
C. Diffie-Hellman
D. DSS - Digital Signature Standard - answerA. Symmetric Key Cryptography
Which of the following is true of network security?
A. A firewall is a not a necessity in today's connected world.
B. A firewall is a necessity in today's connected world.
C. A whitewall is a necessity in today's connected world.
D. A black firewall is a necessity in today's connected world. - answerB. A firewall is a
necessity in today's connected world.
What is called the access protection system that limits connections by calling back the
number of a previously authorized location?
A. Sendback systems
B. Callback forward systems
C. Callback systems
D. Sendback forward systems - answerC. callback systems
What is a decrease in amplitude as a signal propagates along a transmission medium
best known as?
A. Crosstalk
B. Noise
C. Delay distortion
D. Attenuation - answerD. Attenuation
Which device acting as a translator is used to connect two networks or applications from
layer 4 up to layer 7 of the ISO/OSI Model?
A. Bridge
B. Repeater
C. Router
D. Gateway - answerD. gateway
In which layer of the OSI Model are connection-oriented protocols located in the TCP/IP
suite of protocols?
A. Transport layer
B. Application layer
, C. Physical layer
D. Network layer - answerA. Transport layer
Which of the following is a telecommunication device that translates data from digital to
analog form and back to digital?
A. Multiplexer
B. Modem
C. Protocol converter
D. Concentrator - answerB. Modem
Which of the following transmission media would NOT be affected by cross talk or
interference?
A. Copper cable
B. Radio System
C. Satellite radiolink
D. Fiber optic cables - answerD. Fiber optic cables
What is called an attack where the attacker spoofs the source IP address in an ICMP
ECHO broadcast packet so it seems to have originated at the victim's system,
in order to flood it with REPLY packets?
A. SYN Flood attack
B. Smurf attack
C. Ping of Death attack
D. Denial of Service (DOS) attack - answerB. smurf attack
What is the main difference between a Smurf and a Fraggle attack?
A. A Smurf attack is ICMP-based and a Fraggle attack is UDP-based.
B. A Smurf attack is UDP-based and a Fraggle attack is TCP-based.
C. Smurf attack packets cannot be spoofed.
D. A Smurf attack is UDP-based and a Fraggle attack is ICMP-based. - answerA. A
Smurf attack is ICMP-based and a Fraggle attack is UDP-based.
Why are coaxial cables called "coaxial"?
A. it includes two physical channels that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running along the
same axis.
B. it includes one physical channel that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running along the
same axis
C. it includes two physical channels that carries the signal surrounded (after a layer of
insulation) by another two concentric physical channels, both running along
the same axis.
D. it includes one physical channel that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running perpendicular
C845
Which of the following type of cryptography is used when both parties use the same key
to communicate securely with each other?
A. Symmetric Key Cryptography
B. PKI - Public Key Infrastructure
C. Diffie-Hellman
D. DSS - Digital Signature Standard - answerA. Symmetric Key Cryptography
Which of the following is true of network security?
A. A firewall is a not a necessity in today's connected world.
B. A firewall is a necessity in today's connected world.
C. A whitewall is a necessity in today's connected world.
D. A black firewall is a necessity in today's connected world. - answerB. A firewall is a
necessity in today's connected world.
What is called the access protection system that limits connections by calling back the
number of a previously authorized location?
A. Sendback systems
B. Callback forward systems
C. Callback systems
D. Sendback forward systems - answerC. callback systems
What is a decrease in amplitude as a signal propagates along a transmission medium
best known as?
A. Crosstalk
B. Noise
C. Delay distortion
D. Attenuation - answerD. Attenuation
Which device acting as a translator is used to connect two networks or applications from
layer 4 up to layer 7 of the ISO/OSI Model?
A. Bridge
B. Repeater
C. Router
D. Gateway - answerD. gateway
In which layer of the OSI Model are connection-oriented protocols located in the TCP/IP
suite of protocols?
A. Transport layer
B. Application layer
, C. Physical layer
D. Network layer - answerA. Transport layer
Which of the following is a telecommunication device that translates data from digital to
analog form and back to digital?
A. Multiplexer
B. Modem
C. Protocol converter
D. Concentrator - answerB. Modem
Which of the following transmission media would NOT be affected by cross talk or
interference?
A. Copper cable
B. Radio System
C. Satellite radiolink
D. Fiber optic cables - answerD. Fiber optic cables
What is called an attack where the attacker spoofs the source IP address in an ICMP
ECHO broadcast packet so it seems to have originated at the victim's system,
in order to flood it with REPLY packets?
A. SYN Flood attack
B. Smurf attack
C. Ping of Death attack
D. Denial of Service (DOS) attack - answerB. smurf attack
What is the main difference between a Smurf and a Fraggle attack?
A. A Smurf attack is ICMP-based and a Fraggle attack is UDP-based.
B. A Smurf attack is UDP-based and a Fraggle attack is TCP-based.
C. Smurf attack packets cannot be spoofed.
D. A Smurf attack is UDP-based and a Fraggle attack is ICMP-based. - answerA. A
Smurf attack is ICMP-based and a Fraggle attack is UDP-based.
Why are coaxial cables called "coaxial"?
A. it includes two physical channels that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running along the
same axis.
B. it includes one physical channel that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running along the
same axis
C. it includes two physical channels that carries the signal surrounded (after a layer of
insulation) by another two concentric physical channels, both running along
the same axis.
D. it includes one physical channel that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running perpendicular