Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.






2. ______________ is a Unix security scanning tool developed at Texas A&M university.






3. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.






4. It is difficult to prosecute a computer criminal if _________ are not deployed






5. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.






6. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?






7. Countermeasures' main objectives






8. An intrusion detection system is an example of what type of countermeasure?






9. RSA is not based on a ________






10. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.






11. Which of the following is NOT and encryption algorithm?






12. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.






13. Digital Certificates use which protocol?






14. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.






15. A standardized list of the most common security weaknesses and exploits is the __________.






16. Which range defines 'well known ports?'






17. A ______________ is an electronically generated record that ties a user's ID to their public key.






18. The ability to adjust access control to the exact amount of permission necessary is called ______________.






19. A type of virus that resides in a Word or Excel document is called a ___________ virus?






20. Data being delivered from the source to the intended receiver without being altered






21. The IDEA algorithm (used in PGP) is _______ bits long.






22. Contain - Recover - Review - Identify - Prepare






23. The most secure method for storing backup tapes is?






24. Committing computer crimes in such small doses that they almost go unnoticed.






25. Layer 4 of the OSI model corresponds to which layer of the DoD model?






26. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.






27. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas






28. There are 65536 _________






29. ______________ is a major component of an overall risk management program.






30. What security principle is based on the division of job responsibilities - designed to prevent fraud?






31. Macintosh computers are _____ at risk for receiving viruses.






32. Remote Access Dial-in User Service






33. Countermeasures address security concerns in this category






34. Name two types of Intrusion Detection Systems






35. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






36. Accounting - Authentication - and ____________ are the AAAs of information security.






37. Ways to deal with risk.






38. In a Public Key Infrastructure (PKI) - what is the role of a directory server?






39. __________ is a tool used by network administrators to capture packets from a network.






40. DES - Data Encryption standard has a 128 bit key and is ________






41. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?






42. S/MIME was developed for the protection of what communication mechanism(s)?






43. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?






44. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down






45. They specifically target telephone networks






46. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.






47. Smart cards are a secure alternative to which weak security mechanism?






48. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.






49. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN






50. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests