SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An intrusion detection system is an example of what type of countermeasure?
0-1023
Detective
Risk Equation
Sued for privacy violations
2. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
Users can gain access to any resource upon request (assuming they have proper permissions)
Logic bombs
Mobile
RSA
3. Which of the concepts best describes Availability in relation to computer resources?
Users can gain access to any resource upon request (assuming they have proper permissions)
IPSEC
Separation of Duties
One way hash
4. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
Quantitative analysis
Privacy violations
modems
Personal Firewall - IDS - host based - Antivirus
5. Committing computer crimes in such small doses that they almost go unnoticed.
Salami attack
Hoaxes
Email
modems
6. Countermeasures address security concerns in this category
Privacy violations
Authorization
Virus definition downloads and system virus scans
Information
7. These should be done on a weekly basis
Virus definition downloads and system virus scans
CVE - Common Vulnerabilities and Exposures
Layer 3 - Host to Host
Confidentiality - Availability -Integrity of data
8. Countermeasures' main objectives
Cryptanalysis
One way hash
Prevent - Recover - Detect
Quantitative analysis
9. Cable modems are ___________than DSL connections
Logic bombs
Business enabler
Less secure
Information
10. ____________ is a file system that was poorly designed and has numerous security flaws.
NFS
Authorization
Acceptance - Transfer - Mitigate
Ethernet
11. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Authorization
C2
NFS
Warning Banner
12. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Environmental
Risk assessment
Buffer Overflow
C2
13. A standardized list of the most common security weaknesses and exploits is the __________.
DAC - Discretionary Access Control
Passfilt.dll
CVE - Common Vulnerabilities and Exposures
TIGER
14. Data being delivered from the source to the intended receiver without being altered
Protection of data from unauthorized users
Payload
CHAP
Fixed length
15. The ultimate goal of a computer forensics specialist is to ___________________.
Passwords
Preserve electronic evidence and protect it from any alteration
Personal Firewall - IDS - host based - Antivirus
NT Audit events
16. ______________ is a Unix security scanning tool developed at Texas A&M university.
TIGER
SLE - Single Loss Expectancy
Log files
Presentation Layer - L6
17. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Social Engineering
Symmetric algorithm
Phreaks
Warning banners
18. A true network security audit does include an audit for _____________
NFS
Authorization
Social Engineering
modems
19. Remote Access Dial-in User Service
Intentions of the perpetrator
Payload
Logic bombs
RADIUS
20. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?
Data Hiding
Man In The Middle
Virus definition downloads and system virus scans
Intentions of the perpetrator
21. A formula used in Quantitative risk analysis
Detective
Fixed length
Warning Banner
SLE - Single Loss Expectancy
22. Digital Certificates use which protocol?
Warning banners
Acceptance - Transfer - Mitigate
X.509
CHAP
23. RSA is not based on a ________
a good password policy
DAC - Discretionary Access Control
IDEA algorithm
Symmetric algorithm
24. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Authorization
CERT - SANS - CERIAS - COAST
Off site in a climate controlled area
Warning Banner
25. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
Wild
Hackers and crackers
Also
Email
26. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
All
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
C2
MAC - Mandatory Access Control
27. Today - ______________ are almost as serious as security violations
Confidentiality - Availability -Integrity of data
Privacy violations
IPSEC
Directive
28. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.
Confidentiality
Cramming
DAC - Discretionary Access Control
Warning Banner
29. A ______________ is an electronically generated record that ties a user's ID to their public key.
Certificate
IANA
Assignment
MAC - Mandatory Access Control
30. The IDEA algorithm (used in PGP) is _______ bits long.
128
Biometrics
C2
Environmental
31. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Log files
Risk Equation
IDEA algorithm
ISO
32. MD5 is a ___________ algorithm
Buffer Overflow
Depcrypting
PGP
One way hash
33. Main goals of an information security program
Prevent - Recover - Detect
Intrusion Detection System
Confidentiality - Availability -Integrity of data
Warning Banner
34. ____ members of the staff need to be educated in disaster recovery procedures.
All
C2
MAC - Mandatory Access Control
Acceptance - Transfer - Mitigate
35. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
Wild
Password audit
Cramming
Macro
36. ______________ relates to the concept of protecting data from unauthorized users.
ISO
Confidentiality
Directive
Salami attack
37. Organizations that can be a valid Certificate Authority (CA)
PGP
Warning banners
Hoaxes
Verisign - Microsoft - Dell
38. Logon and Logoff - Use of User Rights - Security Policy Change
Password audit
Business enabler
NT Audit events
DAC - Discretionary Access Control
39. Allows File owners to determine access rights.
Accountability
Decentralized access control
Quantitative analysis
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
40. Companies can now be __________ just as easily as they can be sued for security compromises.
IANA
Polymorphic
Sued for privacy violations
Layer 3 - Host to Host
41. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.
Information Security policies
involves only computer to computer transactions
Hoaxes
Biometrics
42. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
0-1023
Hackers and crackers
A PGP Signed message
Information Security policies
43. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Users can gain access to any resource upon request (assuming they have proper permissions)
Fixed length
Certificate
Residual risk
44. To help managers find the correct cost balance between risks and countermeasures
Main goal of a risk management program
Accountability
Assignment
Macro
45. The __________ is the most dangerous part of a virus program.
Payload
Accountability
Polymorphic
Stealth viruses
46. __________ is a tool used by network administrators to capture packets from a network.
Sniffer
CVE - Common Vulnerabilities and Exposures
Cramming
Social Engineering
47. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
NFS
CHAP
Intrusion Detection System
a good password policy
48. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
Stealth viruses
Warning Banner
Hackers and crackers
involves only computer to computer transactions
49. Vulnerability x Threat = RISK is an example of the _______________.
Risk Equation
MAC - Mandatory Access Control
Confidentiality - Availability -Integrity of data
Multi-partite viruses
50. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______
Passfilt.dll
Preserve electronic evidence and protect it from any alteration
SLE - Single Loss Expectancy
Layer 3 - Host to Host