SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A standardized list of the most common security weaknesses and exploits is the __________.
Assignment
A PGP Signed message
Man In The Middle
CVE - Common Vulnerabilities and Exposures
2. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
A PGP Signed message
Warning banners
128
Separation of Duties
3. They specifically target telephone networks
run applications as generic accounts with little or no privileges.
Phreaks
Polymorphic
Host based - network based
4. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Reboot or system startup
Gathering digital evidence
IDEA algorithm
Stateful Inspection
5. Public keys are used for encrypting messages and private keys are used for __________messages.
Protection of data from unauthorized users
Virus definition downloads and system virus scans
SSL
Depcrypting
6. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
Sniffer
Salami attack
Directive
Unix / Linux based security tools?
7. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
Cramming
Verisign - Microsoft - Dell
CRACK
Quantitative analysis
8. Macintosh computers are _____ at risk for receiving viruses.
Also
SET
Log files
involves only computer to computer transactions
9. Cable modems are ___________than DSL connections
Passive network attack
Less secure
SYN Flooding
Wild
10. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Buffer Overflow
Confidentiality
RSA
NT Audit events
11. Stealth viruses live in memory while __________ are written to disk
Email
NT Audit events
Logic bombs
Environmental
12. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
ISO
Residual risk
Less secure
involves only computer to computer transactions
13. __________ is the most famous Unix password cracking tool.
CRACK
MAC - Mandatory Access Control
Environmental
Ethernet
14. Countermeasures address security concerns in this category
Information
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
product development life cycle
Host based - network based
15. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
IPSEC
Authentication
DAC - Discretionary Access Control
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
16. ______________ is a major component of an overall risk management program.
Risk assessment
Privacy violations
ISO
Cryptanalysis
17. RSA is not based on a ________
SET
Symmetric algorithm
Mobile
Fixed length
18. Today - ______________ are almost as serious as security violations
Privacy violations
Protection of data from unauthorized users
Symmetric algorithm
Wild
19. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Hackers and crackers
Warning Banner
Accountability
NT Audit events
20. Which organization(s) are responsible for the timely distribution of information security intelligence data?
IPSEC
CERT - SANS - CERIAS - COAST
involves only computer to computer transactions
Certificate
21. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
Host based - network based
Cisco
Cramming
RSA
22. Smart cards are a secure alternative to which weak security mechanism?
Passwords
S/Key - OPIE
Main goal of a risk management program
run applications as generic accounts with little or no privileges.
23. This free (for personal use) program is used to encrypt and decrypt emails.
Quantitative analysis
PGP
Cryptanalysis
Business enabler
24. ______________ is a Unix security scanning tool developed at Texas A&M university.
Biometrics
Information
involves only computer to computer transactions
TIGER
25. The most secure method for storing backup tapes is?
modems
product development life cycle
Host based - network based
Off site in a climate controlled area
26. Companies can now be __________ just as easily as they can be sued for security compromises.
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Sued for privacy violations
Confidentiality
MAC - Mandatory Access Control
27. S/MIME was developed for the protection of what communication mechanism(s)?
Man In The Middle
X.509
Passfilt.dll
Email
28. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
Directive
Authorization
Stealth viruses
Password audit
29. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
Polymorphic
NFS
Wild
involves only computer to computer transactions
30. Remote Access Dial-in User Service
RADIUS
Passfilt.dll
RSA
Cryptanalysis
31. Logon and Logoff - Use of User Rights - Security Policy Change
Personal Firewall - IDS - host based - Antivirus
NT Audit events
CERT - SANS - CERIAS - COAST
Reboot or system startup
32. Data being delivered from the source to the intended receiver without being altered
RADIUS
One way hash
Hackers and crackers
Protection of data from unauthorized users
33. __________ is a tool used by network administrators to capture packets from a network.
Certificate
Sniffer
Environmental
Preserve electronic evidence and protect it from any alteration
34. A formula used in Quantitative risk analysis
Confidentiality
Protection of data from unauthorized users
SLE - Single Loss Expectancy
ISO
35. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
Stealth viruses
Users can gain access to any resource upon request (assuming they have proper permissions)
CHAP
DAC - Discretionary Access Control
36. Examples of One- Time Password technology
Symmetric algorithm
RADIUS
S/Key - OPIE
Biometrics
37. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Hoaxes
Hackers and crackers
Passfilt.dll
S/Key - OPIE
38. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
NT Audit events
Payload
Decentralized access control
Information Security policies
39. HTTP - FTP - SMTP reside at which layer of the OSI model?
Cramming
Sued for privacy violations
Information Security policies
Layer 7 - Application
40. IKE - Internet Key Exchange is often used in conjunction with what security standard?
SLE - Single Loss Expectancy
Depcrypting
IPSEC
Phreaks
41. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
Salami attack
ISO
CHAP
Personal Firewall - IDS - host based - Antivirus
42. Which range defines 'well known ports?'
Confidentiality
modems
MAC - Mandatory Access Control
0-1023
43. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
Salami attack
DSS - Digital Signature Standard
0-1023
Intentions of the perpetrator
44. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
Biometrics
Warning Banner
involves only computer to computer transactions
128
45. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
Symmetric algorithm
Layer 7 - Application
Assignment
X.509
46. ___________________ is responsible for creating security policies and for communicating those policies to system users.
modems
ISO
Granularity
Mobile
47. DES - Data Encryption standard has a 128 bit key and is ________
Not very difficult to break.
IANA
Data Classification
Phreaks
48. The ability to identify and audit a user and his / her actions is known as ____________.
Quantitative analysis
Privacy violations
Payload
Accountability
49. Digital Certificates use which protocol?
Authentication
Residual risk
X.509
Intrusion Detection System
50. Vulnerability x Threat = RISK is an example of the _______________.
Risk Equation
Stateful Inspection
Wild
Layer 3 - Host to Host
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests