Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. One method that can reduce exposure to malicious code is to ___________________






2. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.






3. Macintosh computers are _____ at risk for receiving viruses.






4. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.






5. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down






6. Information security policies are a ___________________.






7. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.






8. DES - Data Encryption standard has a 128 bit key and is ________






9. It is difficult to prosecute a computer criminal if _________ are not deployed






10. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic






11. Combine both boot and file virus behavior






12. Types of firewalls: Packet Filtering - Application Proxy - and _________________.






13. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.






14. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?






15. Public keys are used for encrypting messages and private keys are used for __________messages.






16. ______________ is a major component of an overall risk management program.






17. Countermeasures' main objectives






18. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?






19. A type of virus that resides in a Word or Excel document is called a ___________ virus?






20. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.






21. Companies can now be __________ just as easily as they can be sued for security compromises.






22. Wiretapping is an example of a ________.






23. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?






24. The ability to identify and audit a user and his / her actions is known as ____________.






25. S/MIME was developed for the protection of what communication mechanism(s)?






26. In a Public Key Infrastructure (PKI) - what is the role of a directory server?






27. Allows File owners to determine access rights.






28. Code Review - Certification - Accreditation - Functional Design Review - System Test Review






29. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.






30. The IDEA algorithm (used in PGP) is _______ bits long.






31. Vulnerability x Threat = RISK is an example of the _______________.






32. Cable modems are ___________than DSL connections






33. ____________ is a file system that was poorly designed and has numerous security flaws.






34. Countermeasures address security concerns in this category






35. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.






36. What is the main difference between computer abuse and computer crime?






37. Today - ______________ are almost as serious as security violations






38. ______________ relates to the concept of protecting data from unauthorized users.






39. A true network security audit does include an audit for _____________






40. A ______________ is an electronically generated record that ties a user's ID to their public key.






41. A Security Reference Monitor relates to which DoD security standard?






42. Which range defines 'well known ports?'






43. MD5 is a ___________ algorithm






44. ________ is the authoritative entity which lists port assignments






45. Contain - Recover - Review - Identify - Prepare






46. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






47. An intrusion detection system is an example of what type of countermeasure?






48. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.






49. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas






50. These should be done on a weekly basis