Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.






2. The __________ is the most dangerous part of a virus program.






3. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?






4. These should be done on a weekly basis






5. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.






6. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.






7. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.






8. A true network security audit does include an audit for _____________






9. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.






10. Name two types of Intrusion Detection Systems






11. The most secure method for storing backup tapes is?






12. Allows File owners to determine access rights.






13. ________ is the authoritative entity which lists port assignments






14. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.






15. Organizations that can be a valid Certificate Authority (CA)






16. They specifically target telephone networks






17. _______________ supply AV engines with false information to avoid detection






18. DES - Data Encryption standard has a 128 bit key and is ________






19. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______






20. Which layer of the OSI model handles encryption?






21. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down






22. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.






23. Countermeasures' main objectives






24. Vulnerability x Threat = RISK is an example of the _______________.






25. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?






26. The ability to identify and audit a user and his / her actions is known as ____________.






27. Examples of One- Time Password technology






28. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.






29. There are 5 classes of IP addresses available - but only 3 classes are in common use today






30. Layer 4 of the OSI model corresponds to which layer of the DoD model?






31. It is difficult to prosecute a computer criminal if _________ are not deployed






32. Macintosh computers are _____ at risk for receiving viruses.






33. A Security Reference Monitor relates to which DoD security standard?






34. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.






35. ______________ is a major component of an overall risk management program.






36. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.






37. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.






38. ___________________ is responsible for creating security policies and for communicating those policies to system users.






39. Companies can now be __________ just as easily as they can be sued for security compromises.






40. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?






41. Stealth viruses live in memory while __________ are written to disk






42. There are 65536 _________






43. Identifying specific attempts to penetrate systems is the function of the _______________.






44. A ______________ is an electronically generated record that ties a user's ID to their public key.






45. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.






46. Accounting - Authentication - and ____________ are the AAAs of information security.






47. __________ is the most famous Unix password cracking tool.






48. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.






49. Countermeasures address security concerns in this category






50. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?