SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. __________ is a tool used by network administrators to capture packets from a network.
involves only computer to computer transactions
Sniffer
Risk Equation
Social Engineering
2. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
One way hash
Confidentiality - Availability -Integrity of data
X.509
DSS - Digital Signature Standard
3. A boot sector virus goes to work when what event takes place?
Reboot or system startup
Verisign - Microsoft - Dell
Virus definition downloads and system virus scans
Preserve electronic evidence and protect it from any alteration
4. Countermeasures' main objectives
Symmetric algorithm
Data Hiding
All
Prevent - Recover - Detect
5. The ability to identify and audit a user and his / her actions is known as ____________.
product development life cycle
Accountability
Detective
To make user certificates available to others
6. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
To make user certificates available to others
Also
Logic bombs
Detective
7. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Depcrypting
Off site in a climate controlled area
Log files
Social Engineering
8. RSA is not based on a ________
Symmetric algorithm
Passwords
Certificate
Personal Firewall - IDS - host based - Antivirus
9. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
Personal Firewall - IDS - host based - Antivirus
Wild
Confidentiality
Biometrics
10. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Not rigid
Ethernet
Wild
Buffer Overflow
11. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Warning Banner
NFS
Polymorphic
Test virus
12. Today - ______________ are almost as serious as security violations
Layer 7 - Application
Privacy violations
Risk Equation
Information
13. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
A PGP Signed message
Data Classification
Warning Banner
X.509
14. A one way hash converts a string of random length into a _______________ encrypted string.
Fixed length
IANA
Steps in handling incidents
SYN Flooding
15. One method that can reduce exposure to malicious code is to ___________________
run applications as generic accounts with little or no privileges.
Macro
NT Audit events
Wild
16. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
X.509
Environmental
Sniffer
SYN Flooding
17. A standardized list of the most common security weaknesses and exploits is the __________.
Unix / Linux based security tools?
Accountability
RADIUS
CVE - Common Vulnerabilities and Exposures
18. ______________ relates to the concept of protecting data from unauthorized users.
Detective
Confidentiality
DAC - Discretionary Access Control
Protection of data from unauthorized users
19. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
DAC - Discretionary Access Control
Virus definition downloads and system virus scans
Ethernet
Business enabler
20. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
product development life cycle
CHAP
Accountability
Risk Equation
21. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
Protection of data from unauthorized users
Presentation Layer - L6
Salami attack
Not rigid
22. IKE - Internet Key Exchange is often used in conjunction with what security standard?
Data Hiding
Hackers and crackers
Depcrypting
IPSEC
23. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
SET
Risk assessment
Risk Equation
24. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
Cisco
Off site in a climate controlled area
CVE - Common Vulnerabilities and Exposures
Sniffer
25. S/MIME was developed for the protection of what communication mechanism(s)?
Email
Passive network attack
Biometrics
Stateful Inspection
26. It is difficult to prosecute a computer criminal if _________ are not deployed
Passive network attack
Cisco
Warning banners
Reboot or system startup
27. They specifically target telephone networks
Detective
Sniffer
Macro
Phreaks
28. Organizations that can be a valid Certificate Authority (CA)
ISO
Host based - network based
IPSEC
Verisign - Microsoft - Dell
29. Wiretapping is an example of a ________.
Authentication
DAC - Discretionary Access Control
Privacy violations
Passive network attack
30. The ability to adjust access control to the exact amount of permission necessary is called ______________.
Hackers and crackers
Steps in handling incidents
Wild
Granularity
31. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Personal Firewall - IDS - host based - Antivirus
Passive network attack
Macro
Host based - network based
32. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
Directive
Users can gain access to any resource upon request (assuming they have proper permissions)
modems
PGP
33. Cable modems are ___________than DSL connections
Preserve electronic evidence and protect it from any alteration
Accountability
SYN Flooding
Less secure
34. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
Data Classification
Assignment
IPSEC
Also
35. There are 5 classes of IP addresses available - but only 3 classes are in common use today
Directive
Separation of Duties
Protection of data from unauthorized users
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
36. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Separation of Duties
Privacy violations
C2
Warning Banner
37. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down
CRACK
Depcrypting
a good password policy
Mobile
38. ________ is the authoritative entity which lists port assignments
Not very difficult to break.
IANA
Passfilt.dll
Email
39. So far - no one has been able to crack the ____________ with Brute Force.
Accountability
product development life cycle
IDEA algorithm
Sued for privacy violations
40. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Ethernet
Sued for privacy violations
Stateful Inspection
Biometrics
41. Information security policies are a ___________________.
One way hash
Preserve electronic evidence and protect it from any alteration
a good password policy
Business enabler
42. Which range defines 'well known ports?'
Depcrypting
Fixed length
0-1023
CVE - Common Vulnerabilities and Exposures
43. Public keys are used for encrypting messages and private keys are used for __________messages.
Unix / Linux based security tools?
Not rigid
Depcrypting
IPSEC
44. Which organization(s) are responsible for the timely distribution of information security intelligence data?
One way hash
CERT - SANS - CERIAS - COAST
Privacy violations
IPSEC
45. Which layer of the OSI model handles encryption?
Presentation Layer - L6
Preserve electronic evidence and protect it from any alteration
Stateful Inspection
MAC - Mandatory Access Control
46. Combine both boot and file virus behavior
Multi-partite viruses
Risk assessment
Detective
run applications as generic accounts with little or no privileges.
47. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Mobile
product development life cycle
modems
Environmental
48. Layer 4 of the OSI model corresponds to which layer of the DoD model?
Sued for privacy violations
Polymorphic
Not rigid
Layer 3 - Host to Host
49. MD5 is a ___________ algorithm
Stateful Inspection
One way hash
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Decentralized access control
50. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
IPSEC
Data Hiding
Cisco
S/Key - OPIE
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests