Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which layer of the OSI model handles encryption?






2. One method that can reduce exposure to malicious code is to ___________________






3. ________ is the authoritative entity which lists port assignments






4. A true network security audit does include an audit for _____________






5. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.






6. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.






7. In a Public Key Infrastructure (PKI) - what is the role of a directory server?






8. Which of the following is NOT and encryption algorithm?






9. HTTP - FTP - SMTP reside at which layer of the OSI model?






10. A Security Reference Monitor relates to which DoD security standard?






11. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______






12. Organizations that can be a valid Certificate Authority (CA)






13. _______________ supply AV engines with false information to avoid detection






14. A standardized list of the most common security weaknesses and exploits is the __________.






15. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition






16. The ultimate goal of a computer forensics specialist is to ___________________.






17. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.






18. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?






19. The ability to adjust access control to the exact amount of permission necessary is called ______________.






20. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






21. Main goals of an information security program






22. To help managers find the correct cost balance between risks and countermeasures






23. There are 65536 _________






24. MD5 is a ___________ algorithm






25. ____________ is a file system that was poorly designed and has numerous security flaws.






26. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?






27. Companies can now be __________ just as easily as they can be sued for security compromises.






28. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.






29. DES - Data Encryption standard has a 128 bit key and is ________






30. Cable modems are ___________than DSL connections






31. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?






32. There are 5 classes of IP addresses available - but only 3 classes are in common use today






33. What security principle is based on the division of job responsibilities - designed to prevent fraud?






34. ______________ is a Unix security scanning tool developed at Texas A&M university.






35. Which major vendor adopted TACACS into its product line as a form of AAA architecture?






36. Smart cards are a secure alternative to which weak security mechanism?






37. Logon and Logoff - Use of User Rights - Security Policy Change






38. Ways to deal with risk.






39. Which of the concepts best describes Availability in relation to computer resources?






40. A formula used in Quantitative risk analysis






41. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.






42. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.






43. RSA is not based on a ________






44. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN






45. Remote Access Dial-in User Service






46. Code Review - Certification - Accreditation - Functional Design Review - System Test Review






47. Which organization(s) are responsible for the timely distribution of information security intelligence data?






48. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.






49. A one way hash converts a string of random length into a _______________ encrypted string.






50. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?