Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which organization(s) are responsible for the timely distribution of information security intelligence data?






2. Which of the following is NOT and encryption algorithm?






3. ____ members of the staff need to be educated in disaster recovery procedures.






4. Which of the concepts best describes Availability in relation to computer resources?






5. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?






6. A true network security audit does include an audit for _____________






7. Countermeasures address security concerns in this category






8. This free (for personal use) program is used to encrypt and decrypt emails.






9. Contain - Recover - Review - Identify - Prepare






10. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas






11. __________ is the most famous Unix password cracking tool.






12. Smart cards are a secure alternative to which weak security mechanism?






13. Name two types of Intrusion Detection Systems






14. Combine both boot and file virus behavior






15. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.






16. Types of firewalls: Packet Filtering - Application Proxy - and _________________.






17. Vulnerability x Threat = RISK is an example of the _______________.






18. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?






19. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






20. ______________ is a major component of an overall risk management program.






21. There are 5 classes of IP addresses available - but only 3 classes are in common use today






22. An attempt to break an encryption algorithm is called _____________.






23. An intrusion detection system is an example of what type of countermeasure?






24. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.






25. The __________ is the most dangerous part of a virus program.






26. The ultimate goal of a computer forensics specialist is to ___________________.






27. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.






28. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.






29. A boot sector virus goes to work when what event takes place?






30. So far - no one has been able to crack the ____________ with Brute Force.






31. The ability to adjust access control to the exact amount of permission necessary is called ______________.






32. A formula used in Quantitative risk analysis






33. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.






34. A standardized list of the most common security weaknesses and exploits is the __________.






35. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic






36. Which layer of the OSI model handles encryption?






37. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.






38. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy






39. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?






40. __________ is a tool used by network administrators to capture packets from a network.






41. S/MIME was developed for the protection of what communication mechanism(s)?






42. These should be done on a weekly basis






43. Macintosh computers are _____ at risk for receiving viruses.






44. Logon and Logoff - Use of User Rights - Security Policy Change






45. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?






46. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.






47. To help managers find the correct cost balance between risks and countermeasures






48. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.






49. What is the main difference between computer abuse and computer crime?






50. Information security policies are a ___________________.