SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Layer 7 - Application
Polymorphic
Biometrics
Passfilt.dll
2. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
RSA
SYN Flooding
MAC - Mandatory Access Control
ISO
3. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
PGP
Gathering digital evidence
Certificate
Wild
4. ____ members of the staff need to be educated in disaster recovery procedures.
All
S/Key - OPIE
Confidentiality - Availability -Integrity of data
Passfilt.dll
5. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
Configuration Control
product development life cycle
0-1023
RSA
6. The ability to identify and audit a user and his / her actions is known as ____________.
Information
Business enabler
run applications as generic accounts with little or no privileges.
Accountability
7. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Buffer Overflow
SET
Certificate
C2
8. To help managers find the correct cost balance between risks and countermeasures
a good password policy
SET
Main goal of a risk management program
Confidentiality - Availability -Integrity of data
9. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
Passfilt.dll
Stateful Inspection
Environmental
Not very difficult to break.
10. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.
All
0-1023
Data Classification
Depcrypting
11. It is difficult to prosecute a computer criminal if _________ are not deployed
Confidentiality
Email
Stealth viruses
Warning banners
12. Data being delivered from the source to the intended receiver without being altered
Protection of data from unauthorized users
Business enabler
Reboot or system startup
Presentation Layer - L6
13. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Certificate
Macro
Hoaxes
Symmetric algorithm
14. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
Data Hiding
Log files
SET
Risk assessment
15. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.
Hackers and crackers
Hoaxes
Directive
Data Hiding
16. Cable modems are ___________than DSL connections
Stateful Inspection
Fixed length
Less secure
Detective
17. A boot sector virus goes to work when what event takes place?
Reboot or system startup
Information Security policies
modems
DSS - Digital Signature Standard
18. Accounting - Authentication - and ____________ are the AAAs of information security.
Authorization
Accountability
SET
Fixed length
19. S/MIME was developed for the protection of what communication mechanism(s)?
Email
Authentication
Salami attack
Preserve electronic evidence and protect it from any alteration
20. Companies can now be __________ just as easily as they can be sued for security compromises.
Passive network attack
Confidentiality - Availability -Integrity of data
Sued for privacy violations
NFS
21. The IDEA algorithm (used in PGP) is _______ bits long.
Confidentiality
128
Logic bombs
Warning banners
22. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
CHAP
Quantitative analysis
Authentication
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
23. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Passwords
Social Engineering
S/Key - OPIE
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
24. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Mobile
modems
All
NFS
25. MD5 is a ___________ algorithm
Symmetric algorithm
One way hash
CHAP
SLE - Single Loss Expectancy
26. Allows File owners to determine access rights.
Depcrypting
Decentralized access control
Less secure
SSL
27. ________ is the authoritative entity which lists port assignments
Authorization
Separation of Duties
Stealth viruses
IANA
28. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
Hoaxes
SET
Personal Firewall - IDS - host based - Antivirus
Sued for privacy violations
29. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Passive network attack
Not rigid
Layer 7 - Application
Biometrics
30. Digital Certificates use which protocol?
Hackers and crackers
Intentions of the perpetrator
Confidentiality
X.509
31. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Configuration Control
Residual risk
Environmental
Hackers and crackers
32. Ways to deal with risk.
Cramming
Salami attack
Unix / Linux based security tools?
Acceptance - Transfer - Mitigate
33. DES - Data Encryption standard has a 128 bit key and is ________
Not very difficult to break.
Buffer Overflow
Warning banners
Decentralized access control
34. One method that can reduce exposure to malicious code is to ___________________
CERT - SANS - CERIAS - COAST
Password audit
Man In The Middle
run applications as generic accounts with little or no privileges.
35. The ultimate goal of a computer forensics specialist is to ___________________.
Buffer Overflow
Information
Available service ports
Preserve electronic evidence and protect it from any alteration
36. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
CHAP
Warning banners
Directive
Information Security policies
37. What is the main difference between computer abuse and computer crime?
Wild
Buffer Overflow
Intentions of the perpetrator
Environmental
38. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
Social Engineering
SYN Flooding
Business enabler
Personal Firewall - IDS - host based - Antivirus
39. Public keys are used for encrypting messages and private keys are used for __________messages.
Mobile
Biometrics
product development life cycle
Depcrypting
40. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Ethernet
Sniffer
Passwords
Hackers and crackers
41. So far - no one has been able to crack the ____________ with Brute Force.
0-1023
a good password policy
IDEA algorithm
Passwords
42. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______
Assignment
Confidentiality - Availability -Integrity of data
Stealth viruses
Passfilt.dll
43. The most secure method for storing backup tapes is?
Data Classification
Off site in a climate controlled area
Stateful Inspection
involves only computer to computer transactions
44. HTTP - FTP - SMTP reside at which layer of the OSI model?
Payload
Layer 7 - Application
S/Key - OPIE
Authorization
45. ______________ is a Unix security scanning tool developed at Texas A&M university.
Accountability
Social Engineering
TIGER
a good password policy
46. __________ is the most famous Unix password cracking tool.
Wild
Confidentiality - Availability -Integrity of data
CRACK
Symmetric algorithm
47. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
DSS - Digital Signature Standard
Passfilt.dll
Confidentiality
SET
48. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Acceptance - Transfer - Mitigate
S/Key - OPIE
CERT - SANS - CERIAS - COAST
Intentions of the perpetrator
49. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.
Ethernet
Cryptanalysis
Symmetric algorithm
DAC - Discretionary Access Control
50. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Passfilt.dll
Main goal of a risk management program
Certificate