SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ________ is the authoritative entity which lists port assignments
Protection of data from unauthorized users
Man In The Middle
Cryptanalysis
IANA
2. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?
Host based - network based
Risk Equation
Man In The Middle
Business enabler
3. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.
DAC - Discretionary Access Control
S/Key - OPIE
Not rigid
Not very difficult to break.
4. Which of the following is NOT and encryption algorithm?
Phreaks
0-1023
SSL
Cisco
5. Vulnerability x Threat = RISK is an example of the _______________.
Risk Equation
Intentions of the perpetrator
TIGER
Buffer Overflow
6. Layer 4 of the OSI model corresponds to which layer of the DoD model?
Layer 3 - Host to Host
0-1023
involves only computer to computer transactions
a good password policy
7. DES - Data Encryption standard has a 128 bit key and is ________
All
CVE - Common Vulnerabilities and Exposures
Not very difficult to break.
Accountability
8. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.
Risk Equation
Directive
Data Classification
Not very difficult to break.
9. ____________ is a file system that was poorly designed and has numerous security flaws.
Cramming
Data Classification
Privacy violations
NFS
10. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
C2
Configuration Control
Detective
Cisco
11. Committing computer crimes in such small doses that they almost go unnoticed.
Phreaks
Passwords
A PGP Signed message
Salami attack
12. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
Environmental
Polymorphic
Information Security policies
CVE - Common Vulnerabilities and Exposures
13. Macintosh computers are _____ at risk for receiving viruses.
Personal Firewall - IDS - host based - Antivirus
Warning Banner
Information
Also
14. Countermeasures' main objectives
128
Prevent - Recover - Detect
Warning Banner
Passfilt.dll
15. ____ members of the staff need to be educated in disaster recovery procedures.
All
S/Key - OPIE
Quantitative analysis
Unix / Linux based security tools?
16. It is difficult to prosecute a computer criminal if _________ are not deployed
Users can gain access to any resource upon request (assuming they have proper permissions)
Mobile
Accountability
Warning banners
17. An intrusion detection system is an example of what type of countermeasure?
Passfilt.dll
Detective
involves only computer to computer transactions
IPSEC
18. One method that can reduce exposure to malicious code is to ___________________
modems
Payload
Polymorphic
run applications as generic accounts with little or no privileges.
19. An attempt to break an encryption algorithm is called _____________.
Cryptanalysis
Fixed length
modems
Warning Banner
20. Examples of One- Time Password technology
S/Key - OPIE
Verisign - Microsoft - Dell
Information
Layer 3 - Host to Host
21. Organizations that can be a valid Certificate Authority (CA)
Verisign - Microsoft - Dell
Social Engineering
Quantitative analysis
CHAP
22. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Unix / Linux based security tools?
Log files
Symmetric algorithm
Protection of data from unauthorized users
23. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
Host based - network based
Mobile
SYN Flooding
Business enabler
24. Which layer of the OSI model handles encryption?
Passwords
Separation of Duties
Presentation Layer - L6
Man In The Middle
25. There are 5 classes of IP addresses available - but only 3 classes are in common use today
Social Engineering
Steps in handling incidents
Information Security policies
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
26. _______________ supply AV engines with false information to avoid detection
Cryptanalysis
Preserve electronic evidence and protect it from any alteration
Stealth viruses
NT Audit events
27. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Also
Environmental
Warning Banner
Data Hiding
28. So far - no one has been able to crack the ____________ with Brute Force.
Wild
Man In The Middle
IDEA algorithm
SYN Flooding
29. Name two types of Intrusion Detection Systems
DSS - Digital Signature Standard
Warning banners
Host based - network based
Sued for privacy violations
30. Identifying specific attempts to penetrate systems is the function of the _______________.
S/Key - OPIE
Protection of data from unauthorized users
Intrusion Detection System
Not rigid
31. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Stealth viruses
Stateful Inspection
128
involves only computer to computer transactions
32. What is the main difference between computer abuse and computer crime?
MAC - Mandatory Access Control
Intrusion Detection System
Virus definition downloads and system virus scans
Intentions of the perpetrator
33. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Mobile
RSA
Wild
SET
34. Digital Certificates use which protocol?
Biometrics
Confidentiality
X.509
Intrusion Detection System
35. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
CHAP
Intentions of the perpetrator
Preserve electronic evidence and protect it from any alteration
CVE - Common Vulnerabilities and Exposures
36. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
Multi-partite viruses
Not rigid
Certificate
Prevent - Recover - Detect
37. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
Passfilt.dll
product development life cycle
Presentation Layer - L6
SET
38. Main goals of an information security program
Users can gain access to any resource upon request (assuming they have proper permissions)
Test virus
Mobile
Confidentiality - Availability -Integrity of data
39. Information security policies are a ___________________.
RSA
Passwords
SLE - Single Loss Expectancy
Business enabler
40. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Warning Banner
modems
CERT - SANS - CERIAS - COAST
Information
41. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Granularity
SLE - Single Loss Expectancy
Residual risk
Warning banners
42. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Symmetric algorithm
Macro
Presentation Layer - L6
Mobile
43. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
IANA
Salami attack
Gathering digital evidence
Assignment
44. S/MIME was developed for the protection of what communication mechanism(s)?
Residual risk
Intentions of the perpetrator
Email
Cramming
45. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
Risk Equation
Directive
Unix / Linux based security tools?
Polymorphic
46. A ______________ is an electronically generated record that ties a user's ID to their public key.
Business enabler
Data Hiding
Presentation Layer - L6
Certificate
47. To help managers find the correct cost balance between risks and countermeasures
Sniffer
S/Key - OPIE
Main goal of a risk management program
Not rigid
48. Accounting - Authentication - and ____________ are the AAAs of information security.
Authorization
Unix / Linux based security tools?
Warning Banner
Users can gain access to any resource upon request (assuming they have proper permissions)
49. A Security Reference Monitor relates to which DoD security standard?
Intentions of the perpetrator
Payload
a good password policy
C2
50. Which of the concepts best describes Availability in relation to computer resources?
0-1023
Not rigid
Man In The Middle
Users can gain access to any resource upon request (assuming they have proper permissions)