New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 6 Question 91 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 91
Topic #: 6
[All SSCP Questions]

A DMZ is also known as a

Show Suggested Answer Hide Answer
Suggested Answer: B

Instead of using a Certificate Authority, PGP uses a 'Web of Trust', where users can certify each other in a mesh model, which is best applied to smaller groups.

In cryptography, a web of trust is a concept used in PGP, GnuPG, and other OpenPGP compatible systems to establish the authenticity of the binding between a public key and its owner. Its decentralized trust model is an alternative to the centralized trust model of a public key infrastructure (PKI), which relies exclusively on a certificate authority (or a hierarchy of such). The web of trust concept was first put forth by PGP creator Phil Zimmermann in 1992 in the manual for PGP version 2.0.

Pretty Good Privacy (PGP) is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security of e-mail communications. It was created by Phil Zimmermann in 1991.

As per Shon Harris's book:

Pretty Good Privacy (PGP) was designed by Phil Zimmerman as a freeware e-mail security program and was released in 1991. It was the first widespread public key encryption program. PGP is a complete cryptosystem that uses cryptographic protection to protect e-mail and files. It can use RSA public key encryption for key management and use IDEA symmetric cipher for bulk encryption of data, although the user has the option of picking different types of algorithms for these functions. PGP can provide confidentiality by using the IDEA encryption algorithm, integrity by using the MD5 hashing algorithm, authentication by using the public key certificates, and nonrepudiation by using cryptographically signed messages. PGP initially used its own type of digital certificates rather than what is used in PKI, but they both have similar purposes. Today PGP support X.509 V3 digital certificates.

Reference(s) used for this question:

KRUTZ,

Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 4: Cryptography (page 169).

Shon Harris, CISSP All in One book

https://en.wikipedia.org/wiki/Pretty_Good_Privacy

TIPTON, Hal, (ISC)2, Introduction to the CISSP Exam presentation.


Contribute your Thoughts:

0/2000 characters
Lavera
3 months ago
Really? I always thought a bastion host was the same thing.
upvoted 0 times
...
Julie
3 months ago
Nope, that's not right! It's for security, not attracting threats.
upvoted 0 times
...
Cherelle
3 months ago
I thought it was just a place to attract hackers?
upvoted 0 times
...
Larae
4 months ago
Totally agree, it's all about isolating the network!
upvoted 0 times
...
Galen
4 months ago
A DMZ is often called a screened subnet.
upvoted 0 times
...
Bo
4 months ago
I thought a bastion host was related to DMZs, but I can't remember if that's the same thing or just a component of it.
upvoted 0 times
...
Estrella
4 months ago
I feel like a DMZ is supposed to be a place to attract hackers, but that seems a bit off. Maybe it's more about security?
upvoted 0 times
...
Kiley
4 months ago
I remember practicing a question about firewalls and DMZs, and I think the three-legged firewall was mentioned, but I can't recall the exact context.
upvoted 0 times
...
Dannie
5 months ago
I think a DMZ is often referred to as a screened subnet, but I'm not entirely sure if that's the only term used.
upvoted 0 times
...
My
5 months ago
Ah, I remember now - a DMZ is a three-legged firewall configuration. Option B is the correct answer.
upvoted 0 times
...
Jenelle
5 months ago
A DMZ is a place to attract hackers? That doesn't sound right. I'm going to eliminate option C and focus on the other choices.
upvoted 0 times
...
Robt
5 months ago
I'm pretty sure a DMZ is a screened subnet, so I'll go with option A.
upvoted 0 times
...
Albina
5 months ago
Hmm, I remember learning about DMZs, but I'm a bit confused on the exact definition. I'll have to think this through carefully.
upvoted 0 times
...
Gracia
5 months ago
This seems like a straightforward question about FortiEDR's post-infection protection capabilities. I'm confident I can figure this out.
upvoted 0 times
...
Tijuana
5 months ago
Okay, let me think this through step-by-step. The question is asking about the three processes of creating laws that impact the audit process. I know the main ones are legislative, regulatory, and judicial, so I'm going to go with option A.
upvoted 0 times
...
Jules
5 months ago
I'm pretty sure Nominal Group Technique is used to help a group reach consensus, so I'll go with option A.
upvoted 0 times
...
Alba
9 months ago
Wait, a DMZ is a place to attract hackers? That's like setting up a buffet for them and telling them to dig in!
upvoted 0 times
...
Nancey
9 months ago
A bastion host is a good choice for a DMZ. It's a hardened system that acts as a gateway to the internal network.
upvoted 0 times
...
Mammie
10 months ago
Attracting hackers to a DMZ? That's like inviting them to a party and giving them the address! Not the best idea...
upvoted 0 times
Pearly
8 months ago
C) a place to attract hackers
upvoted 0 times
...
Frank
8 months ago
B) three legged firewall
upvoted 0 times
...
Osvaldo
8 months ago
A) screened subnet
upvoted 0 times
...
...
Rosendo
10 months ago
A three-legged firewall is a good way to implement a DMZ. It provides an extra layer of security between the public internet and the internal network.
upvoted 0 times
Dulce
9 months ago
C) a place to attract hackers
upvoted 0 times
...
Jonell
9 months ago
B) three legged firewall
upvoted 0 times
...
Reena
9 months ago
A) screened subnet
upvoted 0 times
...
Gladys
9 months ago
D) bastion host
upvoted 0 times
...
Vincenza
9 months ago
B) three legged firewall
upvoted 0 times
...
Willow
9 months ago
A) screened subnet
upvoted 0 times
...
...
Dusti
10 months ago
A DMZ is definitely a screened subnet. It's a separate network segment used to isolate public-facing services from the internal network.
upvoted 0 times
Zena
10 months ago
Yes, it's important to keep public-facing services separate from the internal network.
upvoted 0 times
...
Christiane
10 months ago
I agree, a DMZ is definitely a screened subnet.
upvoted 0 times
...
...
Lashawnda
10 months ago
I'm not sure, but I think it could also be D) bastion host because it acts as a secure gateway.
upvoted 0 times
...
Belen
10 months ago
I agree with Rusty, a DMZ is definitely a screened subnet.
upvoted 0 times
...
Rusty
11 months ago
I think the answer is A) screened subnet.
upvoted 0 times
...

Save Cancel