SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Contain - Recover - Review - Identify - Prepare
Directive
Passive network attack
Steps in handling incidents
Cisco
2. Vulnerability x Threat = RISK is an example of the _______________.
Symmetric algorithm
To make user certificates available to others
C2
Risk Equation
3. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
CVE - Common Vulnerabilities and Exposures
Macro
Log files
Payload
4. RSA is not based on a ________
Stealth viruses
Depcrypting
Symmetric algorithm
Residual risk
5. To help managers find the correct cost balance between risks and countermeasures
Decentralized access control
DAC - Discretionary Access Control
RADIUS
Main goal of a risk management program
6. Cable modems are ___________than DSL connections
Authorization
One way hash
Less secure
Symmetric algorithm
7. _______________ supply AV engines with false information to avoid detection
Available service ports
Passfilt.dll
Host based - network based
Stealth viruses
8. IKE - Internet Key Exchange is often used in conjunction with what security standard?
Sued for privacy violations
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Macro
IPSEC
9. Accounting - Authentication - and ____________ are the AAAs of information security.
CRACK
S/Key - OPIE
Password audit
Authorization
10. A boot sector virus goes to work when what event takes place?
Intentions of the perpetrator
Reboot or system startup
Decentralized access control
a good password policy
11. A Security Reference Monitor relates to which DoD security standard?
modems
Data Hiding
Gathering digital evidence
C2
12. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
Prevent - Recover - Detect
Assignment
Social Engineering
Business enabler
13. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
Payload
Authentication
SSL
X.509
14. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______
Passfilt.dll
Data Hiding
Symmetric algorithm
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
15. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
SLE - Single Loss Expectancy
Warning Banner
NT Audit events
Test virus
16. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down
Residual risk
Steps in handling incidents
Depcrypting
a good password policy
17. A formula used in Quantitative risk analysis
0-1023
TIGER
modems
SLE - Single Loss Expectancy
18. Which layer of the OSI model handles encryption?
Presentation Layer - L6
C2
NFS
Risk assessment
19. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
X.509
Email
Directive
RADIUS
20. A ______________ is an electronically generated record that ties a user's ID to their public key.
IDEA algorithm
Certificate
CRACK
All
21. The IDEA algorithm (used in PGP) is _______ bits long.
128
Cisco
Payload
Unix / Linux based security tools?
22. Main goals of an information security program
Confidentiality - Availability -Integrity of data
Multi-partite viruses
A PGP Signed message
SYN Flooding
23. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
ISO
Wild
Gathering digital evidence
Macro
24. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
0-1023
Buffer Overflow
Residual risk
product development life cycle
25. There are 5 classes of IP addresses available - but only 3 classes are in common use today
Detective
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Risk Equation
involves only computer to computer transactions
26. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
0-1023
Passwords
To make user certificates available to others
Directive
27. These should be done on a weekly basis
Quantitative analysis
Passive network attack
Virus definition downloads and system virus scans
Not rigid
28. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Privacy violations
modems
Configuration Control
Warning Banner
29. An intrusion detection system is an example of what type of countermeasure?
Residual risk
Detective
CRACK
Virus definition downloads and system virus scans
30. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
run applications as generic accounts with little or no privileges.
CHAP
Gathering digital evidence
Assignment
31. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Stateful Inspection
Data Hiding
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Authorization
32. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Gathering digital evidence
Payload
Preserve electronic evidence and protect it from any alteration
To make user certificates available to others
33. Which range defines 'well known ports?'
Multi-partite viruses
0-1023
C2
Acceptance - Transfer - Mitigate
34. Companies can now be __________ just as easily as they can be sued for security compromises.
Sued for privacy violations
Assignment
Multi-partite viruses
Authorization
35. What security principle is based on the division of job responsibilities - designed to prevent fraud?
Separation of Duties
Configuration Control
Environmental
Available service ports
36. __________ is a tool used by network administrators to capture packets from a network.
Buffer Overflow
IDEA algorithm
Sniffer
NFS
37. Today - ______________ are almost as serious as security violations
modems
Presentation Layer - L6
Authentication
Privacy violations
38. A type of virus that resides in a Word or Excel document is called a ___________ virus?
0-1023
Wild
Macro
To make user certificates available to others
39. Organizations that can be a valid Certificate Authority (CA)
Information
IANA
Mobile
Verisign - Microsoft - Dell
40. DES - Data Encryption standard has a 128 bit key and is ________
Not very difficult to break.
Verisign - Microsoft - Dell
CVE - Common Vulnerabilities and Exposures
Off site in a climate controlled area
41. Macintosh computers are _____ at risk for receiving viruses.
Phreaks
Also
Password audit
Passwords
42. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Residual risk
PGP
Presentation Layer - L6
Hackers and crackers
43. ____________ is a file system that was poorly designed and has numerous security flaws.
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Certificate
NFS
Virus definition downloads and system virus scans
44. Data being delivered from the source to the intended receiver without being altered
Information Security policies
Protection of data from unauthorized users
IPSEC
DSS - Digital Signature Standard
45. A one way hash converts a string of random length into a _______________ encrypted string.
RSA
Fixed length
ISO
CRACK
46. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
Ethernet
Not rigid
IPSEC
Logic bombs
47. S/MIME was developed for the protection of what communication mechanism(s)?
Social Engineering
Stealth viruses
Not rigid
Email
48. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
One way hash
SYN Flooding
Social Engineering
Certificate
49. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Authentication
Sued for privacy violations
Mobile
Cramming
50. Which of the following is NOT and encryption algorithm?
DAC - Discretionary Access Control
0-1023
Macro
SSL