SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
DAC - Discretionary Access Control
TIGER
Risk assessment
Data Hiding
2. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
Accountability
Protection of data from unauthorized users
DSS - Digital Signature Standard
Information
3. Accounting - Authentication - and ____________ are the AAAs of information security.
Warning Banner
Authorization
a good password policy
Multi-partite viruses
4. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
product development life cycle
SLE - Single Loss Expectancy
Not rigid
Host based - network based
5. Vulnerability x Threat = RISK is an example of the _______________.
Salami attack
Risk Equation
Sued for privacy violations
Passive network attack
6. Remote Access Dial-in User Service
RSA
ISO
RADIUS
Intrusion Detection System
7. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
All
Prevent - Recover - Detect
Less secure
Directive
8. Identifying specific attempts to penetrate systems is the function of the _______________.
Confidentiality
CRACK
Intrusion Detection System
CERT - SANS - CERIAS - COAST
9. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
IPSEC
Passfilt.dll
CHAP
IANA
10. MD5 is a ___________ algorithm
CRACK
Reboot or system startup
Business enabler
One way hash
11. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas
C2
Quantitative analysis
Depcrypting
Reboot or system startup
12. ___________________ is responsible for creating security policies and for communicating those policies to system users.
modems
ISO
Stateful Inspection
Verisign - Microsoft - Dell
13. What security principle is based on the division of job responsibilities - designed to prevent fraud?
Separation of Duties
Users can gain access to any resource upon request (assuming they have proper permissions)
Steps in handling incidents
X.509
14. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
X.509
Multi-partite viruses
A PGP Signed message
Authorization
15. ______________ is a major component of an overall risk management program.
Risk assessment
CVE - Common Vulnerabilities and Exposures
One way hash
128
16. A formula used in Quantitative risk analysis
Virus definition downloads and system virus scans
Assignment
IANA
SLE - Single Loss Expectancy
17. Data being delivered from the source to the intended receiver without being altered
Business enabler
CHAP
Protection of data from unauthorized users
Detective
18. Digital Certificates use which protocol?
Hoaxes
DSS - Digital Signature Standard
Warning Banner
X.509
19. It is difficult to prosecute a computer criminal if _________ are not deployed
Business enabler
Man In The Middle
PGP
Warning banners
20. IKE - Internet Key Exchange is often used in conjunction with what security standard?
IPSEC
CHAP
Stateful Inspection
Detective
21. ____ members of the staff need to be educated in disaster recovery procedures.
NT Audit events
Log files
Polymorphic
All
22. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
modems
Directive
Warning Banner
C2
23. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
IPSEC
MAC - Mandatory Access Control
Not rigid
modems
24. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Salami attack
ISO
Polymorphic
Risk assessment
25. The __________ is the most dangerous part of a virus program.
Decentralized access control
Residual risk
Payload
Ethernet
26. So far - no one has been able to crack the ____________ with Brute Force.
X.509
Data Hiding
IDEA algorithm
Multi-partite viruses
27. They specifically target telephone networks
Certificate
Assignment
Phreaks
Directive
28. Organizations that can be a valid Certificate Authority (CA)
Verisign - Microsoft - Dell
Layer 3 - Host to Host
Hoaxes
Not very difficult to break.
29. ______________ relates to the concept of protecting data from unauthorized users.
A PGP Signed message
Confidentiality
Residual risk
Passfilt.dll
30. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Macro
Passwords
Preserve electronic evidence and protect it from any alteration
Man In The Middle
31. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
Phreaks
Authentication
RSA
Confidentiality
32. Macintosh computers are _____ at risk for receiving viruses.
DAC - Discretionary Access Control
DSS - Digital Signature Standard
Also
Stateful Inspection
33. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Macro
Symmetric algorithm
Log files
Risk assessment
34. A ______________ is an electronically generated record that ties a user's ID to their public key.
Confidentiality
Email
Certificate
Reboot or system startup
35. Today - ______________ are almost as serious as security violations
Authentication
CHAP
Privacy violations
Separation of Duties
36. A one way hash converts a string of random length into a _______________ encrypted string.
Separation of Duties
Multi-partite viruses
Information Security policies
Fixed length
37. Countermeasures address security concerns in this category
a good password policy
Virus definition downloads and system virus scans
Information
Data Classification
38. To help managers find the correct cost balance between risks and countermeasures
X.509
Main goal of a risk management program
product development life cycle
Residual risk
39. HTTP - FTP - SMTP reside at which layer of the OSI model?
Passive network attack
Acceptance - Transfer - Mitigate
CERT - SANS - CERIAS - COAST
Layer 7 - Application
40. An intrusion detection system is an example of what type of countermeasure?
Intentions of the perpetrator
Separation of Duties
0-1023
Detective
41. Wiretapping is an example of a ________.
Passive network attack
Privacy violations
CRACK
S/Key - OPIE
42. ____________ is a file system that was poorly designed and has numerous security flaws.
CVE - Common Vulnerabilities and Exposures
Acceptance - Transfer - Mitigate
Host based - network based
NFS
43. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
Email
Unix / Linux based security tools?
DSS - Digital Signature Standard
SET
44. The most secure method for storing backup tapes is?
MAC - Mandatory Access Control
Mobile
Passive network attack
Off site in a climate controlled area
45. Ways to deal with risk.
Payload
Warning banners
Acceptance - Transfer - Mitigate
Data Hiding
46. Committing computer crimes in such small doses that they almost go unnoticed.
Passwords
X.509
Macro
Salami attack
47. The ability to identify and audit a user and his / her actions is known as ____________.
Layer 3 - Host to Host
Social Engineering
Business enabler
Accountability
48. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Certificate
CRACK
Information
CERT - SANS - CERIAS - COAST
49. ________ is the authoritative entity which lists port assignments
Certificate
Passfilt.dll
IANA
Not very difficult to break.
50. RSA is not based on a ________
Symmetric algorithm
Stateful Inspection
Salami attack
Presentation Layer - L6
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests