Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.






2. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down






3. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.






4. Combine both boot and file virus behavior






5. Contain - Recover - Review - Identify - Prepare






6. IKE - Internet Key Exchange is often used in conjunction with what security standard?






7. __________ is a tool used by network administrators to capture packets from a network.






8. __________ is the most famous Unix password cracking tool.






9. The IDEA algorithm (used in PGP) is _______ bits long.






10. Which of the following is NOT and encryption algorithm?






11. A standardized list of the most common security weaknesses and exploits is the __________.






12. A boot sector virus goes to work when what event takes place?






13. Name two types of Intrusion Detection Systems






14. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.






15. Layer 4 of the OSI model corresponds to which layer of the DoD model?






16. Information security policies are a ___________________.






17. These should be done on a weekly basis






18. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?






19. A ______________ is an electronically generated record that ties a user's ID to their public key.






20. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.






21. Today - ______________ are almost as serious as security violations






22. To help managers find the correct cost balance between risks and countermeasures






23. So far - no one has been able to crack the ____________ with Brute Force.






24. HTTP - FTP - SMTP reside at which layer of the OSI model?






25. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.






26. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic






27. Remote Access Dial-in User Service






28. Accounting - Authentication - and ____________ are the AAAs of information security.






29. Types of firewalls: Packet Filtering - Application Proxy - and _________________.






30. Identifying specific attempts to penetrate systems is the function of the _______________.






31. There are 65536 _________






32. DES - Data Encryption standard has a 128 bit key and is ________






33. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy






34. _______________ supply AV engines with false information to avoid detection






35. The __________ is the most dangerous part of a virus program.






36. A type of virus that resides in a Word or Excel document is called a ___________ virus?






37. A formula used in Quantitative risk analysis






38. In a Public Key Infrastructure (PKI) - what is the role of a directory server?






39. ______________ is a major component of an overall risk management program.






40. Macintosh computers are _____ at risk for receiving viruses.






41. The ultimate goal of a computer forensics specialist is to ___________________.






42. Public keys are used for encrypting messages and private keys are used for __________messages.






43. ___________________ is responsible for creating security policies and for communicating those policies to system users.






44. Cable modems are ___________than DSL connections






45. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.






46. What is the main difference between computer abuse and computer crime?






47. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas






48. There are 5 classes of IP addresses available - but only 3 classes are in common use today






49. ______________ is a Unix security scanning tool developed at Texas A&M university.






50. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis