SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Data being delivered from the source to the intended receiver without being altered
Steps in handling incidents
Hoaxes
DSS - Digital Signature Standard
Protection of data from unauthorized users
2. An attempt to break an encryption algorithm is called _____________.
Cryptanalysis
IDEA algorithm
Gathering digital evidence
Stateful Inspection
3. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
RSA
Less secure
Reboot or system startup
Configuration Control
4. This free (for personal use) program is used to encrypt and decrypt emails.
PGP
Intentions of the perpetrator
Cisco
RADIUS
5. The ability to adjust access control to the exact amount of permission necessary is called ______________.
Information
Granularity
S/Key - OPIE
Email
6. Public keys are used for encrypting messages and private keys are used for __________messages.
involves only computer to computer transactions
Depcrypting
Presentation Layer - L6
Macro
7. RSA is not based on a ________
Symmetric algorithm
RSA
Risk Equation
Privacy violations
8. S/MIME was developed for the protection of what communication mechanism(s)?
Multi-partite viruses
One way hash
IPSEC
Email
9. To help managers find the correct cost balance between risks and countermeasures
Main goal of a risk management program
Directive
Configuration Control
Man In The Middle
10. The __________ is the most dangerous part of a virus program.
product development life cycle
Macro
Payload
Confidentiality - Availability -Integrity of data
11. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
Unix / Linux based security tools?
NFS
Available service ports
product development life cycle
12. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
NT Audit events
Cramming
involves only computer to computer transactions
0-1023
13. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Macro
Biometrics
C2
Intrusion Detection System
14. Combine both boot and file virus behavior
Layer 7 - Application
All
Multi-partite viruses
Detective
15. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
Warning banners
Unix / Linux based security tools?
C2
involves only computer to computer transactions
16. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
SET
DAC - Discretionary Access Control
TIGER
Mobile
17. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Polymorphic
Not very difficult to break.
RADIUS
A PGP Signed message
18. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
product development life cycle
Accountability
a good password policy
A PGP Signed message
19. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Ethernet
Test virus
Prevent - Recover - Detect
Separation of Duties
20. The IDEA algorithm (used in PGP) is _______ bits long.
128
Configuration Control
modems
Information
21. IKE - Internet Key Exchange is often used in conjunction with what security standard?
IPSEC
Log files
Layer 7 - Application
Buffer Overflow
22. Which of the concepts best describes Availability in relation to computer resources?
Wild
Users can gain access to any resource upon request (assuming they have proper permissions)
128
Warning Banner
23. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.
RSA
To make user certificates available to others
Data Classification
Unix / Linux based security tools?
24. Vulnerability x Threat = RISK is an example of the _______________.
Stealth viruses
Risk Equation
Authentication
Reboot or system startup
25. Layer 4 of the OSI model corresponds to which layer of the DoD model?
Cryptanalysis
Information
Risk Equation
Layer 3 - Host to Host
26. A one way hash converts a string of random length into a _______________ encrypted string.
Hackers and crackers
Verisign - Microsoft - Dell
Not very difficult to break.
Fixed length
27. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
Confidentiality
IANA
SYN Flooding
Environmental
28. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Not rigid
Buffer Overflow
Warning Banner
29. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Stateful Inspection
X.509
CVE - Common Vulnerabilities and Exposures
ISO
30. Allows File owners to determine access rights.
Virus definition downloads and system virus scans
Symmetric algorithm
Man In The Middle
Decentralized access control
31. Which range defines 'well known ports?'
0-1023
CHAP
Wild
Accountability
32. Organizations that can be a valid Certificate Authority (CA)
Configuration Control
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Verisign - Microsoft - Dell
Wild
33. __________ is a tool used by network administrators to capture packets from a network.
Sniffer
SSL
Data Classification
C2
34. The ability to identify and audit a user and his / her actions is known as ____________.
Authorization
Not very difficult to break.
Acceptance - Transfer - Mitigate
Accountability
35. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Log files
Man In The Middle
Intentions of the perpetrator
Mobile
36. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Unix / Linux based security tools?
Passwords
Risk Equation
Warning Banner
37. ___________________ is responsible for creating security policies and for communicating those policies to system users.
Authentication
Directive
Privacy violations
ISO
38. Examples of One- Time Password technology
S/Key - OPIE
Configuration Control
Verisign - Microsoft - Dell
Privacy violations
39. Committing computer crimes in such small doses that they almost go unnoticed.
Biometrics
TIGER
Salami attack
Man In The Middle
40. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.
SSL
Environmental
a good password policy
DAC - Discretionary Access Control
41. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
Warning Banner
Cisco
Detective
One way hash
42. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Biometrics
NT Audit events
Assignment
A PGP Signed message
43. Smart cards are a secure alternative to which weak security mechanism?
RSA
RADIUS
Passwords
Biometrics
44. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?
Configuration Control
Passfilt.dll
Preserve electronic evidence and protect it from any alteration
Wild
45. The most secure method for storing backup tapes is?
Not very difficult to break.
IANA
Off site in a climate controlled area
Passive network attack
46. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
SLE - Single Loss Expectancy
Unix / Linux based security tools?
TIGER
SYN Flooding
47. ______________ relates to the concept of protecting data from unauthorized users.
Phreaks
Confidentiality
X.509
Risk assessment
48. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Assignment
Acceptance - Transfer - Mitigate
Data Hiding
Prevent - Recover - Detect
49. Information security policies are a ___________________.
Payload
Directive
CRACK
Business enabler
50. Remote Access Dial-in User Service
RADIUS
NFS
Log files
Certificate