SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RSA is not based on a ________
Protection of data from unauthorized users
Quantitative analysis
Certificate
Symmetric algorithm
2. Smart cards are a secure alternative to which weak security mechanism?
Passwords
Logic bombs
Passfilt.dll
SYN Flooding
3. ______________ relates to the concept of protecting data from unauthorized users.
Authorization
Preserve electronic evidence and protect it from any alteration
Confidentiality
Unix / Linux based security tools?
4. A ______________ is an electronically generated record that ties a user's ID to their public key.
Information
Polymorphic
Certificate
a good password policy
5. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
Reboot or system startup
SYN Flooding
Layer 3 - Host to Host
Symmetric algorithm
6. Organizations that can be a valid Certificate Authority (CA)
Verisign - Microsoft - Dell
CERT - SANS - CERIAS - COAST
Buffer Overflow
Cryptanalysis
7. A boot sector virus goes to work when what event takes place?
run applications as generic accounts with little or no privileges.
Main goal of a risk management program
Risk Equation
Reboot or system startup
8. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
Cisco
Unix / Linux based security tools?
Residual risk
Man In The Middle
9. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Decentralized access control
IDEA algorithm
Log files
Prevent - Recover - Detect
10. Which layer of the OSI model handles encryption?
Multi-partite viruses
Payload
Presentation Layer - L6
Stealth viruses
11. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
product development life cycle
Log files
Unix / Linux based security tools?
Decentralized access control
12. It is difficult to prosecute a computer criminal if _________ are not deployed
Warning banners
ISO
Man In The Middle
Main goal of a risk management program
13. Macintosh computers are _____ at risk for receiving viruses.
Reboot or system startup
Detective
Also
Payload
14. Main goals of an information security program
a good password policy
Confidentiality - Availability -Integrity of data
SSL
Polymorphic
15. ______________ is a Unix security scanning tool developed at Texas A&M university.
X.509
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
TIGER
Cramming
16. Today - ______________ are almost as serious as security violations
Main goal of a risk management program
involves only computer to computer transactions
Privacy violations
DAC - Discretionary Access Control
17. ________ is the authoritative entity which lists port assignments
Warning Banner
Less secure
IANA
Accountability
18. A Security Reference Monitor relates to which DoD security standard?
C2
Configuration Control
product development life cycle
Phreaks
19. A formula used in Quantitative risk analysis
Decentralized access control
CVE - Common Vulnerabilities and Exposures
SLE - Single Loss Expectancy
Authorization
20. This free (for personal use) program is used to encrypt and decrypt emails.
Unix / Linux based security tools?
PGP
Virus definition downloads and system virus scans
Phreaks
21. Vulnerability x Threat = RISK is an example of the _______________.
Password audit
Stateful Inspection
Risk Equation
Cramming
22. Combine both boot and file virus behavior
ISO
MAC - Mandatory Access Control
Residual risk
Multi-partite viruses
23. Which of the following is NOT and encryption algorithm?
Confidentiality - Availability -Integrity of data
IDEA algorithm
SSL
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
24. HTTP - FTP - SMTP reside at which layer of the OSI model?
Test virus
To make user certificates available to others
Layer 7 - Application
SSL
25. __________ is the most famous Unix password cracking tool.
Layer 7 - Application
TIGER
CVE - Common Vulnerabilities and Exposures
CRACK
26. Examples of One- Time Password technology
S/Key - OPIE
Residual risk
Logic bombs
product development life cycle
27. Ways to deal with risk.
Acceptance - Transfer - Mitigate
Unix / Linux based security tools?
Accountability
Preserve electronic evidence and protect it from any alteration
28. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.
Directive
Protection of data from unauthorized users
Data Classification
Multi-partite viruses
29. There are 5 classes of IP addresses available - but only 3 classes are in common use today
SET
Cramming
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
IANA
30. IKE - Internet Key Exchange is often used in conjunction with what security standard?
Cramming
IPSEC
Users can gain access to any resource upon request (assuming they have proper permissions)
To make user certificates available to others
31. Countermeasures address security concerns in this category
Personal Firewall - IDS - host based - Antivirus
Information
TIGER
Test virus
32. Companies can now be __________ just as easily as they can be sued for security compromises.
Sued for privacy violations
Configuration Control
IPSEC
Buffer Overflow
33. An intrusion detection system is an example of what type of countermeasure?
Passwords
Detective
Buffer Overflow
Mobile
34. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
DSS - Digital Signature Standard
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Residual risk
Protection of data from unauthorized users
35. S/MIME was developed for the protection of what communication mechanism(s)?
Buffer Overflow
SSL
Email
Accountability
36. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Also
Buffer Overflow
MAC - Mandatory Access Control
Hackers and crackers
37. ___________________ viruses change the code order of the strain each time they replicate to another machine.
SSL
Not rigid
Polymorphic
Cisco
38. Which organization(s) are responsible for the timely distribution of information security intelligence data?
To make user certificates available to others
involves only computer to computer transactions
CERT - SANS - CERIAS - COAST
Presentation Layer - L6
39. Information security policies are a ___________________.
Stealth viruses
Log files
Warning Banner
Business enabler
40. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
Personal Firewall - IDS - host based - Antivirus
Cisco
Directive
NFS
41. Digital Certificates use which protocol?
X.509
Cisco
MAC - Mandatory Access Control
Intentions of the perpetrator
42. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Steps in handling incidents
product development life cycle
Macro
Main goal of a risk management program
43. Contain - Recover - Review - Identify - Prepare
Layer 3 - Host to Host
Fixed length
Steps in handling incidents
Test virus
44. Logon and Logoff - Use of User Rights - Security Policy Change
modems
Cramming
NT Audit events
Wild
45. A one way hash converts a string of random length into a _______________ encrypted string.
a good password policy
Symmetric algorithm
Accountability
Fixed length
46. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Residual risk
Accountability
Steps in handling incidents
Main goal of a risk management program
47. An attempt to break an encryption algorithm is called _____________.
Phreaks
modems
Cryptanalysis
Biometrics
48. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
Stateful Inspection
Assignment
Confidentiality
128
49. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Passfilt.dll
CVE - Common Vulnerabilities and Exposures
Separation of Duties
Buffer Overflow
50. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?
Logic bombs
Directive
IDEA algorithm
Man In The Middle
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests