Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Macintosh computers are _____ at risk for receiving viruses.






2. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?






3. ___________________ viruses change the code order of the strain each time they replicate to another machine.






4. ______________ is a major component of an overall risk management program.






5. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.






6. Public keys are used for encrypting messages and private keys are used for __________messages.






7. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas






8. Which major vendor adopted TACACS into its product line as a form of AAA architecture?






9. MD5 is a ___________ algorithm






10. This free (for personal use) program is used to encrypt and decrypt emails.






11. RSA is not based on a ________






12. ___________________ is responsible for creating security policies and for communicating those policies to system users.






13. ____ members of the staff need to be educated in disaster recovery procedures.






14. Today - ______________ are almost as serious as security violations






15. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition






16. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?






17. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?






18. The most secure method for storing backup tapes is?






19. What security principle is based on the division of job responsibilities - designed to prevent fraud?






20. The ultimate goal of a computer forensics specialist is to ___________________.






21. Contain - Recover - Review - Identify - Prepare






22. A true network security audit does include an audit for _____________






23. Ways to deal with risk.






24. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.






25. ______________ is a Unix security scanning tool developed at Texas A&M university.






26. Types of firewalls: Packet Filtering - Application Proxy - and _________________.






27. In a Public Key Infrastructure (PKI) - what is the role of a directory server?






28. A formula used in Quantitative risk analysis






29. Cable modems are ___________than DSL connections






30. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.






31. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.






32. Countermeasures' main objectives






33. DES - Data Encryption standard has a 128 bit key and is ________






34. Stealth viruses live in memory while __________ are written to disk






35. Name two types of Intrusion Detection Systems






36. Examples of One- Time Password technology






37. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.






38. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.






39. Digital Certificates use which protocol?






40. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.






41. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic






42. What is the main difference between computer abuse and computer crime?






43. These should be done on a weekly basis






44. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy






45. The __________ is the most dangerous part of a virus program.






46. Code Review - Certification - Accreditation - Functional Design Review - System Test Review






47. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.






48. To help managers find the correct cost balance between risks and countermeasures






49. Countermeasures address security concerns in this category






50. A ______________ is an electronically generated record that ties a user's ID to their public key.