SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Residual risk
Privacy violations
Main goal of a risk management program
2. There are 5 classes of IP addresses available - but only 3 classes are in common use today
Layer 7 - Application
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Not rigid
RADIUS
3. Remote Access Dial-in User Service
Social Engineering
MAC - Mandatory Access Control
Steps in handling incidents
RADIUS
4. ___________________ viruses change the code order of the strain each time they replicate to another machine.
SSL
Available service ports
IDEA algorithm
Polymorphic
5. ___________________ is responsible for creating security policies and for communicating those policies to system users.
Logic bombs
Information
Unix / Linux based security tools?
ISO
6. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Assignment
Less secure
Fixed length
7. Logon and Logoff - Use of User Rights - Security Policy Change
All
NT Audit events
Cryptanalysis
Hoaxes
8. It is difficult to prosecute a computer criminal if _________ are not deployed
RSA
IANA
Warning banners
Assignment
9. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
To make user certificates available to others
Social Engineering
Biometrics
Confidentiality
10. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
a good password policy
Depcrypting
Confidentiality
Stateful Inspection
11. What security principle is based on the division of job responsibilities - designed to prevent fraud?
Risk assessment
Separation of Duties
Sued for privacy violations
Password audit
12. A formula used in Quantitative risk analysis
Available service ports
Passfilt.dll
SLE - Single Loss Expectancy
CERT - SANS - CERIAS - COAST
13. Which layer of the OSI model handles encryption?
NT Audit events
Email
Presentation Layer - L6
Host based - network based
14. The ability to adjust access control to the exact amount of permission necessary is called ______________.
Mobile
Email
Granularity
Wild
15. ____ members of the staff need to be educated in disaster recovery procedures.
Passwords
All
Environmental
Password audit
16. S/MIME was developed for the protection of what communication mechanism(s)?
C2
All
Warning banners
Email
17. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
Data Hiding
Salami attack
ISO
Password audit
18. The ultimate goal of a computer forensics specialist is to ___________________.
Not rigid
Passwords
Residual risk
Preserve electronic evidence and protect it from any alteration
19. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.
Ethernet
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Data Classification
ISO
20. Public keys are used for encrypting messages and private keys are used for __________messages.
Environmental
RADIUS
Wild
Depcrypting
21. A one way hash converts a string of random length into a _______________ encrypted string.
Risk Equation
Warning banners
Prevent - Recover - Detect
Fixed length
22. Vulnerability x Threat = RISK is an example of the _______________.
Risk Equation
ISO
Residual risk
Granularity
23. Data being delivered from the source to the intended receiver without being altered
Phreaks
RSA
Available service ports
Protection of data from unauthorized users
24. Name two types of Intrusion Detection Systems
Host based - network based
Warning Banner
Detective
RADIUS
25. HTTP - FTP - SMTP reside at which layer of the OSI model?
Passfilt.dll
Not very difficult to break.
Layer 7 - Application
Data Hiding
26. DES - Data Encryption standard has a 128 bit key and is ________
Not very difficult to break.
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Configuration Control
Fixed length
27. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
MAC - Mandatory Access Control
Warning banners
Confidentiality
Available service ports
28. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
RSA
Not rigid
Salami attack
Log files
29. Identifying specific attempts to penetrate systems is the function of the _______________.
Test virus
Intrusion Detection System
Symmetric algorithm
Sued for privacy violations
30. MD5 is a ___________ algorithm
A PGP Signed message
One way hash
Layer 7 - Application
Polymorphic
31. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Buffer Overflow
Confidentiality
Environmental
MAC - Mandatory Access Control
32. Digital Certificates use which protocol?
X.509
Certificate
Mobile
Personal Firewall - IDS - host based - Antivirus
33. What is the main difference between computer abuse and computer crime?
Stealth viruses
DSS - Digital Signature Standard
Wild
Intentions of the perpetrator
34. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
involves only computer to computer transactions
Information
Configuration Control
Quantitative analysis
35. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
Information
Stateful Inspection
CHAP
Information Security policies
36. Companies can now be __________ just as easily as they can be sued for security compromises.
PGP
IDEA algorithm
Sued for privacy violations
Layer 7 - Application
37. A ______________ is an electronically generated record that ties a user's ID to their public key.
Detective
Certificate
Symmetric algorithm
Authentication
38. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Configuration Control
Main goal of a risk management program
Log files
All
39. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Cryptanalysis
Not rigid
Configuration Control
Gathering digital evidence
40. Contain - Recover - Review - Identify - Prepare
Steps in handling incidents
Unix / Linux based security tools?
Macro
Salami attack
41. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas
Quantitative analysis
Steps in handling incidents
Reboot or system startup
CRACK
42. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
Residual risk
Accountability
Wild
Users can gain access to any resource upon request (assuming they have proper permissions)
43. An attempt to break an encryption algorithm is called _____________.
modems
Cryptanalysis
Assignment
CRACK
44. Allows File owners to determine access rights.
Unix / Linux based security tools?
SYN Flooding
Passive network attack
Decentralized access control
45. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______
Stateful Inspection
Residual risk
PGP
Passfilt.dll
46. ______________ is a Unix security scanning tool developed at Texas A&M university.
Quantitative analysis
TIGER
product development life cycle
Email
47. Ways to deal with risk.
Acceptance - Transfer - Mitigate
Unix / Linux based security tools?
NT Audit events
TIGER
48. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
Main goal of a risk management program
Authentication
Cramming
Unix / Linux based security tools?
49. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
0-1023
Email
Assignment
PGP
50. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
Buffer Overflow
Man In The Middle
SET
Cryptanalysis