13.11.2014 Views

ISC2

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Answer: A<br />

Question: 18<br />

CORRECT TEXT<br />

______________ is a major component of an overall risk management program.<br />

Answer: Risk<br />

assessment<br />

Question: 19<br />

CORRECT TEXT<br />

An attempt to break an encryption algorithm is called _____________.<br />

Answer:<br />

Cryptanalysis<br />

Question: 20<br />

The act of intercepting the first message in a public key exchange and substituting a bogus key for the<br />

original key is an example of which style of attack?<br />

A. Spoofing<br />

B. Hijacking<br />

C. Man In The Middle<br />

D. Social Engineering<br />

E. Distributed Denial of Service (DDoS)<br />

Answer: C<br />

http://www.examcertify.com/SSCP.html Page 7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!