Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Companies can now be __________ just as easily as they can be sued for security compromises.






2. Accounting - Authentication - and ____________ are the AAAs of information security.






3. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down






4. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?






5. A type of virus that resides in a Word or Excel document is called a ___________ virus?






6. Which organization(s) are responsible for the timely distribution of information security intelligence data?






7. Organizations that can be a valid Certificate Authority (CA)






8. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.






9. Name two types of Intrusion Detection Systems






10. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.






11. Which of the concepts best describes Availability in relation to computer resources?






12. A standardized list of the most common security weaknesses and exploits is the __________.






13. Which of the following is NOT and encryption algorithm?






14. An intrusion detection system is an example of what type of countermeasure?






15. Wiretapping is an example of a ________.






16. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.






17. These should be done on a weekly basis






18. Remote Access Dial-in User Service






19. Countermeasures' main objectives






20. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?






21. HTTP - FTP - SMTP reside at which layer of the OSI model?






22. __________ is the most famous Unix password cracking tool.






23. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.






24. The most secure method for storing backup tapes is?






25. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.






26. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.






27. They specifically target telephone networks






28. In a Public Key Infrastructure (PKI) - what is the role of a directory server?






29. Committing computer crimes in such small doses that they almost go unnoticed.






30. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






31. Macintosh computers are _____ at risk for receiving viruses.






32. Public keys are used for encrypting messages and private keys are used for __________messages.






33. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.






34. Which layer of the OSI model handles encryption?






35. __________ is a tool used by network administrators to capture packets from a network.






36. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.






37. S/MIME was developed for the protection of what communication mechanism(s)?






38. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis






39. There are 5 classes of IP addresses available - but only 3 classes are in common use today






40. Code Review - Certification - Accreditation - Functional Design Review - System Test Review






41. Ways to deal with risk.






42. It is difficult to prosecute a computer criminal if _________ are not deployed






43. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition






44. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.






45. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic






46. What security principle is based on the division of job responsibilities - designed to prevent fraud?






47. A one way hash converts a string of random length into a _______________ encrypted string.






48. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?






49. RSA is not based on a ________






50. To help managers find the correct cost balance between risks and countermeasures