SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Stateful Inspection
Hackers and crackers
RADIUS
S/Key - OPIE
2. Information security policies are a ___________________.
Business enabler
Depcrypting
Environmental
SYN Flooding
3. The most secure method for storing backup tapes is?
C2
Data Classification
DSS - Digital Signature Standard
Off site in a climate controlled area
4. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Log files
Separation of Duties
Logic bombs
Sniffer
5. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
Environmental
CHAP
Granularity
Hackers and crackers
6. So far - no one has been able to crack the ____________ with Brute Force.
IDEA algorithm
Log files
Confidentiality - Availability -Integrity of data
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
7. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
A PGP Signed message
CHAP
CERT - SANS - CERIAS - COAST
Available service ports
8. _______________ supply AV engines with false information to avoid detection
Also
Biometrics
Stealth viruses
S/Key - OPIE
9. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
SET
To make user certificates available to others
Off site in a climate controlled area
RSA
10. The IDEA algorithm (used in PGP) is _______ bits long.
IDEA algorithm
128
Salami attack
Also
11. Public keys are used for encrypting messages and private keys are used for __________messages.
MAC - Mandatory Access Control
Risk Equation
Depcrypting
Hoaxes
12. A standardized list of the most common security weaknesses and exploits is the __________.
IANA
Hackers and crackers
CVE - Common Vulnerabilities and Exposures
Payload
13. Stealth viruses live in memory while __________ are written to disk
Data Classification
Logic bombs
Passfilt.dll
Acceptance - Transfer - Mitigate
14. Remote Access Dial-in User Service
IDEA algorithm
Configuration Control
Macro
RADIUS
15. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
RADIUS
Warning Banner
Certificate
Confidentiality
16. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
X.509
Preserve electronic evidence and protect it from any alteration
Granularity
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
17. RSA is not based on a ________
Symmetric algorithm
Data Classification
Detective
Reboot or system startup
18. Which range defines 'well known ports?'
NT Audit events
0-1023
Man In The Middle
Wild
19. They specifically target telephone networks
Personal Firewall - IDS - host based - Antivirus
Phreaks
Information Security policies
Business enabler
20. Organizations that can be a valid Certificate Authority (CA)
PGP
Man In The Middle
a good password policy
Verisign - Microsoft - Dell
21. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Less secure
Polymorphic
RADIUS
Privacy violations
22. ____________ is a file system that was poorly designed and has numerous security flaws.
Not rigid
NFS
Passwords
Also
23. These should be done on a weekly basis
X.509
Virus definition downloads and system virus scans
Privacy violations
Information Security policies
24. Smart cards are a secure alternative to which weak security mechanism?
Privacy violations
Passwords
Authorization
Social Engineering
25. Main goals of an information security program
Confidentiality - Availability -Integrity of data
CVE - Common Vulnerabilities and Exposures
Hoaxes
Warning banners
26. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
Prevent - Recover - Detect
Logic bombs
Sniffer
Authentication
27. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
Presentation Layer - L6
product development life cycle
SYN Flooding
Privacy violations
28. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down
a good password policy
Personal Firewall - IDS - host based - Antivirus
Preserve electronic evidence and protect it from any alteration
Business enabler
29. Macintosh computers are _____ at risk for receiving viruses.
Ethernet
CRACK
SSL
Also
30. One method that can reduce exposure to malicious code is to ___________________
Configuration Control
run applications as generic accounts with little or no privileges.
Accountability
Confidentiality - Availability -Integrity of data
31. There are 65536 _________
Sniffer
Available service ports
CHAP
Email
32. A formula used in Quantitative risk analysis
Man In The Middle
SLE - Single Loss Expectancy
a good password policy
RADIUS
33. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
Residual risk
involves only computer to computer transactions
Available service ports
Warning Banner
34. Identifying specific attempts to penetrate systems is the function of the _______________.
Intrusion Detection System
Mobile
Detective
Reboot or system startup
35. A Security Reference Monitor relates to which DoD security standard?
Warning banners
Preserve electronic evidence and protect it from any alteration
Authentication
C2
36. A one way hash converts a string of random length into a _______________ encrypted string.
Salami attack
Data Hiding
Sued for privacy violations
Fixed length
37. The __________ is the most dangerous part of a virus program.
Social Engineering
Reboot or system startup
A PGP Signed message
Payload
38. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Man In The Middle
Biometrics
Test virus
To make user certificates available to others
39. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Layer 3 - Host to Host
Stateful Inspection
Log files
involves only computer to computer transactions
40. Cable modems are ___________than DSL connections
Protection of data from unauthorized users
Warning Banner
Less secure
Main goal of a risk management program
41. The ability to adjust access control to the exact amount of permission necessary is called ______________.
involves only computer to computer transactions
Salami attack
Symmetric algorithm
Granularity
42. HTTP - FTP - SMTP reside at which layer of the OSI model?
Preserve electronic evidence and protect it from any alteration
IDEA algorithm
Authorization
Layer 7 - Application
43. Examples of One- Time Password technology
Cramming
ISO
Information
S/Key - OPIE
44. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
Log files
run applications as generic accounts with little or no privileges.
Sniffer
MAC - Mandatory Access Control
45. A boot sector virus goes to work when what event takes place?
TIGER
Sued for privacy violations
Reboot or system startup
Off site in a climate controlled area
46. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
Not rigid
Quantitative analysis
run applications as generic accounts with little or no privileges.
128
47. Name two types of Intrusion Detection Systems
Virus definition downloads and system virus scans
CVE - Common Vulnerabilities and Exposures
Host based - network based
Logic bombs
48. A ______________ is an electronically generated record that ties a user's ID to their public key.
Steps in handling incidents
SLE - Single Loss Expectancy
Passwords
Certificate
49. ___________________ is responsible for creating security policies and for communicating those policies to system users.
ISO
Presentation Layer - L6
NT Audit events
Passwords
50. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
Intentions of the perpetrator
Directive
CVE - Common Vulnerabilities and Exposures
a good password policy