Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Information security policies are a ___________________.






2. Smart cards are a secure alternative to which weak security mechanism?






3. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.






4. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.






5. Cable modems are ___________than DSL connections






6. Accounting - Authentication - and ____________ are the AAAs of information security.






7. The ability to adjust access control to the exact amount of permission necessary is called ______________.






8. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?






9. So far - no one has been able to crack the ____________ with Brute Force.






10. Countermeasures address security concerns in this category






11. __________ is the most famous Unix password cracking tool.






12. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.






13. A one way hash converts a string of random length into a _______________ encrypted string.






14. A formula used in Quantitative risk analysis






15. The most secure method for storing backup tapes is?






16. Countermeasures' main objectives






17. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?






18. DES - Data Encryption standard has a 128 bit key and is ________






19. The ability to identify and audit a user and his / her actions is known as ____________.






20. Name two types of Intrusion Detection Systems






21. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.






22. Today - ______________ are almost as serious as security violations






23. There are 5 classes of IP addresses available - but only 3 classes are in common use today






24. ____ members of the staff need to be educated in disaster recovery procedures.






25. Allows File owners to determine access rights.






26. What security principle is based on the division of job responsibilities - designed to prevent fraud?






27. Layer 4 of the OSI model corresponds to which layer of the DoD model?






28. An attempt to break an encryption algorithm is called _____________.






29. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis






30. Which of the following is NOT and encryption algorithm?






31. ___________________ viruses change the code order of the strain each time they replicate to another machine.






32. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?






33. What is the main difference between computer abuse and computer crime?






34. Data being delivered from the source to the intended receiver without being altered






35. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN






36. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?






37. HTTP - FTP - SMTP reside at which layer of the OSI model?






38. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.






39. Stealth viruses live in memory while __________ are written to disk






40. Ways to deal with risk.






41. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.






42. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.






43. Identifying specific attempts to penetrate systems is the function of the _______________.






44. Logon and Logoff - Use of User Rights - Security Policy Change






45. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.






46. Which range defines 'well known ports?'






47. A boot sector virus goes to work when what event takes place?






48. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.






49. MD5 is a ___________ algorithm






50. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.