SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
SYN Flooding
Macro
MAC - Mandatory Access Control
Accountability
2. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______
ISO
Passfilt.dll
Certificate
Cryptanalysis
3. DES - Data Encryption standard has a 128 bit key and is ________
To make user certificates available to others
Not very difficult to break.
Also
Confidentiality - Availability -Integrity of data
4. The most secure method for storing backup tapes is?
NT Audit events
Log files
Polymorphic
Off site in a climate controlled area
5. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
SSL
ISO
Ethernet
Password audit
6. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Wild
Warning Banner
IANA
Fixed length
7. ____________ is a file system that was poorly designed and has numerous security flaws.
NFS
PGP
Layer 3 - Host to Host
Social Engineering
8. S/MIME was developed for the protection of what communication mechanism(s)?
Email
Password audit
Less secure
Symmetric algorithm
9. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Data Hiding
Warning Banner
Confidentiality
Accountability
10. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Macro
Confidentiality - Availability -Integrity of data
Authorization
Phreaks
11. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Confidentiality
Stateful Inspection
Macro
DAC - Discretionary Access Control
12. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
Accountability
Main goal of a risk management program
Buffer Overflow
Wild
13. A true network security audit does include an audit for _____________
Intrusion Detection System
Users can gain access to any resource upon request (assuming they have proper permissions)
IDEA algorithm
modems
14. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
product development life cycle
MAC - Mandatory Access Control
involves only computer to computer transactions
run applications as generic accounts with little or no privileges.
15. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Layer 3 - Host to Host
CERT - SANS - CERIAS - COAST
Polymorphic
IDEA algorithm
16. Committing computer crimes in such small doses that they almost go unnoticed.
Information
Users can gain access to any resource upon request (assuming they have proper permissions)
Host based - network based
Salami attack
17. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
Granularity
Salami attack
Main goal of a risk management program
Unix / Linux based security tools?
18. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
Payload
Gathering digital evidence
Decentralized access control
Directive
19. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
Wild
Personal Firewall - IDS - host based - Antivirus
Test virus
Polymorphic
20. A ______________ is an electronically generated record that ties a user's ID to their public key.
Certificate
Log files
PGP
Environmental
21. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
Preserve electronic evidence and protect it from any alteration
Accountability
Social Engineering
SET
22. ______________ is a Unix security scanning tool developed at Texas A&M university.
Available service ports
TIGER
One way hash
Residual risk
23. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
Users can gain access to any resource upon request (assuming they have proper permissions)
Hackers and crackers
Cisco
Confidentiality
24. A Security Reference Monitor relates to which DoD security standard?
Sued for privacy violations
C2
Fixed length
Passive network attack
25. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
Risk assessment
Environmental
Presentation Layer - L6
Macro
26. Layer 4 of the OSI model corresponds to which layer of the DoD model?
SLE - Single Loss Expectancy
Accountability
Layer 3 - Host to Host
Phreaks
27. Which range defines 'well known ports?'
Assignment
Salami attack
0-1023
Reboot or system startup
28. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
NT Audit events
Environmental
S/Key - OPIE
Residual risk
29. _______________ supply AV engines with false information to avoid detection
C2
SSL
NFS
Stealth viruses
30. A formula used in Quantitative risk analysis
DAC - Discretionary Access Control
Sniffer
SLE - Single Loss Expectancy
Off site in a climate controlled area
31. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Mobile
Authentication
128
IANA
32. Logon and Logoff - Use of User Rights - Security Policy Change
NT Audit events
Passwords
Intentions of the perpetrator
To make user certificates available to others
33. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
Ethernet
Host based - network based
Users can gain access to any resource upon request (assuming they have proper permissions)
Polymorphic
34. Vulnerability x Threat = RISK is an example of the _______________.
Residual risk
CRACK
Risk Equation
Passfilt.dll
35. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Gathering digital evidence
Salami attack
Polymorphic
Ethernet
36. Countermeasures' main objectives
Layer 3 - Host to Host
C2
Intrusion Detection System
Prevent - Recover - Detect
37. Smart cards are a secure alternative to which weak security mechanism?
Passwords
Information
Prevent - Recover - Detect
Off site in a climate controlled area
38. Macintosh computers are _____ at risk for receiving viruses.
All
Business enabler
Also
Accountability
39. What is the main difference between computer abuse and computer crime?
Intentions of the perpetrator
Cryptanalysis
Risk Equation
Biometrics
40. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
S/Key - OPIE
Sued for privacy violations
Email
Social Engineering
41. A boot sector virus goes to work when what event takes place?
IANA
Data Classification
Reboot or system startup
Users can gain access to any resource upon request (assuming they have proper permissions)
42. Companies can now be __________ just as easily as they can be sued for security compromises.
Cramming
Reboot or system startup
Buffer Overflow
Sued for privacy violations
43. There are 5 classes of IP addresses available - but only 3 classes are in common use today
ISO
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
DAC - Discretionary Access Control
Hoaxes
44. Identifying specific attempts to penetrate systems is the function of the _______________.
SET
Cisco
Intrusion Detection System
All
45. Which of the concepts best describes Availability in relation to computer resources?
Sued for privacy violations
IPSEC
Users can gain access to any resource upon request (assuming they have proper permissions)
Confidentiality
46. __________ is a tool used by network administrators to capture packets from a network.
Assignment
modems
Sniffer
Passive network attack
47. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
SET
Detective
0-1023
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
48. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
Information Security policies
Data Hiding
Cryptanalysis
Passwords
49. What security principle is based on the division of job responsibilities - designed to prevent fraud?
X.509
Fixed length
Separation of Duties
Symmetric algorithm
50. Main goals of an information security program
Confidentiality - Availability -Integrity of data
Man In The Middle
One way hash
Preserve electronic evidence and protect it from any alteration