SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Stateful Inspection
Passive network attack
Hackers and crackers
128
2. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
IDEA algorithm
Ethernet
To make user certificates available to others
NFS
3. What security principle is based on the division of job responsibilities - designed to prevent fraud?
Separation of Duties
TIGER
Information
Cramming
4. There are 65536 _________
Available service ports
Sued for privacy violations
Directive
S/Key - OPIE
5. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Also
SYN Flooding
Data Hiding
Business enabler
6. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Polymorphic
Available service ports
Sued for privacy violations
NT Audit events
7. Which of the concepts best describes Availability in relation to computer resources?
Test virus
TIGER
Fixed length
Users can gain access to any resource upon request (assuming they have proper permissions)
8. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
CHAP
Intentions of the perpetrator
Log files
IPSEC
9. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
A PGP Signed message
Intrusion Detection System
Accountability
Salami attack
10. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
Environmental
Warning banners
Authentication
RADIUS
11. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
Not very difficult to break.
Wild
Cramming
To make user certificates available to others
12. Stealth viruses live in memory while __________ are written to disk
Email
Logic bombs
Also
Intrusion Detection System
13. Main goals of an information security program
Decentralized access control
Sniffer
Confidentiality - Availability -Integrity of data
To make user certificates available to others
14. Which range defines 'well known ports?'
Information Security policies
MAC - Mandatory Access Control
Prevent - Recover - Detect
0-1023
15. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Polymorphic
Layer 3 - Host to Host
Residual risk
All
16. The ultimate goal of a computer forensics specialist is to ___________________.
Preserve electronic evidence and protect it from any alteration
A PGP Signed message
Available service ports
Buffer Overflow
17. MD5 is a ___________ algorithm
Residual risk
Information Security policies
One way hash
Data Hiding
18. This free (for personal use) program is used to encrypt and decrypt emails.
PGP
Information
Acceptance - Transfer - Mitigate
RADIUS
19. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
Unix / Linux based security tools?
IDEA algorithm
Sued for privacy violations
Authentication
20. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Configuration Control
Warning Banner
128
Detective
21. Information security policies are a ___________________.
run applications as generic accounts with little or no privileges.
Detective
Intrusion Detection System
Business enabler
22. Today - ______________ are almost as serious as security violations
Privacy violations
Authorization
Less secure
Phreaks
23. What is the main difference between computer abuse and computer crime?
Intentions of the perpetrator
Data Classification
Host based - network based
All
24. A standardized list of the most common security weaknesses and exploits is the __________.
Assignment
CERT - SANS - CERIAS - COAST
CVE - Common Vulnerabilities and Exposures
Authorization
25. An attempt to break an encryption algorithm is called _____________.
Main goal of a risk management program
Cryptanalysis
Authorization
Salami attack
26. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
Virus definition downloads and system virus scans
Salami attack
Authentication
To make user certificates available to others
27. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
Preserve electronic evidence and protect it from any alteration
Also
Email
Wild
28. __________ is the most famous Unix password cracking tool.
CRACK
Layer 3 - Host to Host
Salami attack
Protection of data from unauthorized users
29. Cable modems are ___________than DSL connections
Also
Email
Cramming
Less secure
30. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Macro
S/Key - OPIE
Passfilt.dll
Sniffer
31. The ability to identify and audit a user and his / her actions is known as ____________.
product development life cycle
a good password policy
Symmetric algorithm
Accountability
32. ____ members of the staff need to be educated in disaster recovery procedures.
All
SET
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Buffer Overflow
33. DES - Data Encryption standard has a 128 bit key and is ________
Gathering digital evidence
Risk Equation
Not very difficult to break.
Less secure
34. Data being delivered from the source to the intended receiver without being altered
Confidentiality - Availability -Integrity of data
NFS
Multi-partite viruses
Protection of data from unauthorized users
35. The __________ is the most dangerous part of a virus program.
Salami attack
Payload
Reboot or system startup
Hackers and crackers
36. Macintosh computers are _____ at risk for receiving viruses.
Sued for privacy violations
Layer 7 - Application
MAC - Mandatory Access Control
Also
37. Accounting - Authentication - and ____________ are the AAAs of information security.
Authorization
modems
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Decentralized access control
38. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?
Off site in a climate controlled area
Configuration Control
Sued for privacy violations
S/Key - OPIE
39. Vulnerability x Threat = RISK is an example of the _______________.
Acceptance - Transfer - Mitigate
Risk Equation
Confidentiality - Availability -Integrity of data
S/Key - OPIE
40. To help managers find the correct cost balance between risks and countermeasures
Unix / Linux based security tools?
DAC - Discretionary Access Control
Risk assessment
Main goal of a risk management program
41. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Confidentiality
involves only computer to computer transactions
CERT - SANS - CERIAS - COAST
Reboot or system startup
42. An intrusion detection system is an example of what type of countermeasure?
DSS - Digital Signature Standard
Cramming
Environmental
Detective
43. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
PGP
Not very difficult to break.
SET
C2
44. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
Email
Passive network attack
MAC - Mandatory Access Control
Accountability
45. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.
Not rigid
Virus definition downloads and system virus scans
SSL
DAC - Discretionary Access Control
46. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
Cisco
RADIUS
Prevent - Recover - Detect
Email
47. ___________________ is responsible for creating security policies and for communicating those policies to system users.
Sued for privacy violations
A PGP Signed message
ISO
Warning banners
48. The IDEA algorithm (used in PGP) is _______ bits long.
128
Protection of data from unauthorized users
Authentication
Directive
49. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Biometrics
ISO
Gathering digital evidence
Phreaks
50. Committing computer crimes in such small doses that they almost go unnoticed.
To make user certificates available to others
C2
SYN Flooding
Salami attack