Skip survey header

Systems Security Certified Practitioner Quiz: SSCP Quiz 8

Systems Security Certified Practitioner Quiz: SSCP Quiz 8

1. What topology correctly describes Ethernet?
2. Which one of the following tools is most often used for identification purposes and is not
suitable for use as an authenticator?
3. Chris would like to use John the Ripper to test the security of passwords on a compromised
Linux system. What files does he need to conduct this analysis?
4. Mike recently implemented an intrusion prevention system designed to block common network
attacks from affecting his organization. What type of risk management strategy is Mike
pursuing?
5. Which one of the following is an example of physical infrastructure hardening?
6. Tara recently detected a security incident in progress on her network. What action should be
her highest priority at this point?
7. Margot is considering the use of a self-signed certificate to reduce the costs associated with
maintaining a public-facing web server. What is the primary risk associated with the use of self-
signed certificates?
Thank you to our sponsor for providing this free practice quiz.