SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. There are 65536 _________
Available service ports
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Log files
MAC - Mandatory Access Control
2. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Social Engineering
Layer 3 - Host to Host
Phreaks
Multi-partite viruses
3. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Gathering digital evidence
IDEA algorithm
Mobile
Hackers and crackers
4. A one way hash converts a string of random length into a _______________ encrypted string.
Data Classification
Fixed length
Test virus
Sniffer
5. Smart cards are a secure alternative to which weak security mechanism?
NFS
Accountability
Social Engineering
Passwords
6. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
Verisign - Microsoft - Dell
Personal Firewall - IDS - host based - Antivirus
Logic bombs
Password audit
7. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Biometrics
CVE - Common Vulnerabilities and Exposures
involves only computer to computer transactions
Authentication
8. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
modems
Stateful Inspection
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Password audit
9. Stealth viruses live in memory while __________ are written to disk
Hackers and crackers
IPSEC
Logic bombs
Configuration Control
10. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down
Ethernet
MAC - Mandatory Access Control
a good password policy
Privacy violations
11. Identifying specific attempts to penetrate systems is the function of the _______________.
Risk Equation
SYN Flooding
Intrusion Detection System
Protection of data from unauthorized users
12. Data being delivered from the source to the intended receiver without being altered
Users can gain access to any resource upon request (assuming they have proper permissions)
Macro
DSS - Digital Signature Standard
Protection of data from unauthorized users
13. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Risk assessment
Quantitative analysis
Prevent - Recover - Detect
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
14. Wiretapping is an example of a ________.
Users can gain access to any resource upon request (assuming they have proper permissions)
Mobile
Passive network attack
Not rigid
15. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Ethernet
Quantitative analysis
Information
16. A Security Reference Monitor relates to which DoD security standard?
C2
Buffer Overflow
Hackers and crackers
Accountability
17. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
CHAP
RADIUS
NT Audit events
Cramming
18. An attempt to break an encryption algorithm is called _____________.
Available service ports
Password audit
Passfilt.dll
Cryptanalysis
19. There are 5 classes of IP addresses available - but only 3 classes are in common use today
0-1023
Warning banners
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Log files
20. Information security policies are a ___________________.
Data Hiding
Fixed length
Business enabler
Not rigid
21. A ______________ is an electronically generated record that ties a user's ID to their public key.
Certificate
Hackers and crackers
Social Engineering
Symmetric algorithm
22. Examples of One- Time Password technology
Passfilt.dll
Information
NFS
S/Key - OPIE
23. __________ is a tool used by network administrators to capture packets from a network.
Sniffer
Stateful Inspection
C2
Authentication
24. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
Email
involves only computer to computer transactions
Sniffer
Polymorphic
25. Which of the following is NOT and encryption algorithm?
SSL
Man In The Middle
Data Hiding
modems
26. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
Social Engineering
Quantitative analysis
Hackers and crackers
product development life cycle
27. These should be done on a weekly basis
PGP
Virus definition downloads and system virus scans
To make user certificates available to others
Sued for privacy violations
28. This free (for personal use) program is used to encrypt and decrypt emails.
Sued for privacy violations
Steps in handling incidents
SSL
PGP
29. To help managers find the correct cost balance between risks and countermeasures
Log files
Main goal of a risk management program
involves only computer to computer transactions
ISO
30. A type of virus that resides in a Word or Excel document is called a ___________ virus?
SYN Flooding
Macro
A PGP Signed message
CHAP
31. One method that can reduce exposure to malicious code is to ___________________
Personal Firewall - IDS - host based - Antivirus
Gathering digital evidence
Wild
run applications as generic accounts with little or no privileges.
32. Organizations that can be a valid Certificate Authority (CA)
Email
Intentions of the perpetrator
Verisign - Microsoft - Dell
Less secure
33. It is difficult to prosecute a computer criminal if _________ are not deployed
Warning banners
product development life cycle
SSL
Data Hiding
34. ________ is the authoritative entity which lists port assignments
CHAP
Configuration Control
Detective
IANA
35. The ability to identify and audit a user and his / her actions is known as ____________.
PGP
Macro
Accountability
Hoaxes
36. Accounting - Authentication - and ____________ are the AAAs of information security.
CHAP
CRACK
C2
Authorization
37. A boot sector virus goes to work when what event takes place?
S/Key - OPIE
0-1023
Data Classification
Reboot or system startup
38. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
C2
Authentication
Assignment
product development life cycle
39. What is the main difference between computer abuse and computer crime?
IPSEC
Intentions of the perpetrator
Warning Banner
Layer 3 - Host to Host
40. Digital Certificates use which protocol?
Detective
Less secure
X.509
run applications as generic accounts with little or no privileges.
41. Layer 4 of the OSI model corresponds to which layer of the DoD model?
Data Classification
Layer 3 - Host to Host
Personal Firewall - IDS - host based - Antivirus
a good password policy
42. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?
SLE - Single Loss Expectancy
Host based - network based
NFS
Configuration Control
43. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
SLE - Single Loss Expectancy
DSS - Digital Signature Standard
Log files
Environmental
44. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Warning banners
DAC - Discretionary Access Control
Warning Banner
CERT - SANS - CERIAS - COAST
45. The IDEA algorithm (used in PGP) is _______ bits long.
Sued for privacy violations
Salami attack
Reboot or system startup
128
46. They specifically target telephone networks
TIGER
Phreaks
Residual risk
Certificate
47. Countermeasures address security concerns in this category
Information
Email
Data Hiding
product development life cycle
48. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
Hackers and crackers
Personal Firewall - IDS - host based - Antivirus
Data Classification
Cisco
49. ____________ is a file system that was poorly designed and has numerous security flaws.
Intrusion Detection System
To make user certificates available to others
NFS
Test virus
50. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
Not rigid
CVE - Common Vulnerabilities and Exposures
RADIUS
RSA
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests