SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. It is difficult to prosecute a computer criminal if _________ are not deployed
Preserve electronic evidence and protect it from any alteration
product development life cycle
Business enabler
Warning banners
2. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.
Ethernet
Data Classification
Directive
RSA
3. Name two types of Intrusion Detection Systems
SET
Host based - network based
Password audit
128
4. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
CERT - SANS - CERIAS - COAST
Personal Firewall - IDS - host based - Antivirus
0-1023
Separation of Duties
5. The most secure method for storing backup tapes is?
Off site in a climate controlled area
C2
MAC - Mandatory Access Control
Less secure
6. Accounting - Authentication - and ____________ are the AAAs of information security.
MAC - Mandatory Access Control
Protection of data from unauthorized users
CHAP
Authorization
7. The ability to identify and audit a user and his / her actions is known as ____________.
All
NFS
Accountability
Email
8. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
Certificate
Fixed length
DAC - Discretionary Access Control
Unix / Linux based security tools?
9. A formula used in Quantitative risk analysis
run applications as generic accounts with little or no privileges.
SLE - Single Loss Expectancy
Off site in a climate controlled area
SET
10. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Authentication
Social Engineering
Cramming
Data Hiding
11. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
Layer 7 - Application
Information Security policies
RADIUS
Unix / Linux based security tools?
12. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Separation of Duties
Less secure
Virus definition downloads and system virus scans
Log files
13. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Stealth viruses
Host based - network based
Data Hiding
0-1023
14. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Hoaxes
Warning Banner
Mobile
DAC - Discretionary Access Control
15. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
A PGP Signed message
Wild
Unix / Linux based security tools?
MAC - Mandatory Access Control
16. Countermeasures' main objectives
Configuration Control
Not very difficult to break.
Prevent - Recover - Detect
IANA
17. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?
Confidentiality - Availability -Integrity of data
involves only computer to computer transactions
Ethernet
Configuration Control
18. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Fixed length
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
SYN Flooding
SLE - Single Loss Expectancy
19. An intrusion detection system is an example of what type of countermeasure?
Presentation Layer - L6
Password audit
CVE - Common Vulnerabilities and Exposures
Detective
20. Layer 4 of the OSI model corresponds to which layer of the DoD model?
Macro
Cramming
Also
Layer 3 - Host to Host
21. Macintosh computers are _____ at risk for receiving viruses.
All
Also
CERT - SANS - CERIAS - COAST
Depcrypting
22. Remote Access Dial-in User Service
Cryptanalysis
Steps in handling incidents
Residual risk
RADIUS
23. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
Warning Banner
Certificate
Assignment
Multi-partite viruses
24. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
modems
Protection of data from unauthorized users
Stateful Inspection
Not very difficult to break.
25. DES - Data Encryption standard has a 128 bit key and is ________
Symmetric algorithm
Protection of data from unauthorized users
Not very difficult to break.
Business enabler
26. What is the main difference between computer abuse and computer crime?
Intentions of the perpetrator
Separation of Duties
Social Engineering
Accountability
27. The IDEA algorithm (used in PGP) is _______ bits long.
Protection of data from unauthorized users
128
Less secure
Hackers and crackers
28. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Presentation Layer - L6
CERT - SANS - CERIAS - COAST
Test virus
Passfilt.dll
29. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
SYN Flooding
Presentation Layer - L6
Fixed length
0-1023
30. Which of the concepts best describes Availability in relation to computer resources?
Users can gain access to any resource upon request (assuming they have proper permissions)
Less secure
TIGER
Gathering digital evidence
31. One method that can reduce exposure to malicious code is to ___________________
run applications as generic accounts with little or no privileges.
Layer 3 - Host to Host
CHAP
Sniffer
32. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Hackers and crackers
To make user certificates available to others
C2
Mobile
33. MD5 is a ___________ algorithm
Sniffer
Also
Logic bombs
One way hash
34. __________ is a tool used by network administrators to capture packets from a network.
Sniffer
C2
Payload
Users can gain access to any resource upon request (assuming they have proper permissions)
35. The ability to adjust access control to the exact amount of permission necessary is called ______________.
DAC - Discretionary Access Control
X.509
Granularity
Less secure
36. These should be done on a weekly basis
Intrusion Detection System
Data Hiding
Virus definition downloads and system virus scans
Data Classification
37. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
modems
Available service ports
Wild
Acceptance - Transfer - Mitigate
38. Today - ______________ are almost as serious as security violations
Privacy violations
Host based - network based
Password audit
modems
39. Logon and Logoff - Use of User Rights - Security Policy Change
ISO
Off site in a climate controlled area
NT Audit events
Salami attack
40. Cable modems are ___________than DSL connections
Environmental
Residual risk
Less secure
NFS
41. A Security Reference Monitor relates to which DoD security standard?
C2
RADIUS
Reboot or system startup
Assignment
42. There are 5 classes of IP addresses available - but only 3 classes are in common use today
DSS - Digital Signature Standard
Risk Equation
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Not very difficult to break.
43. Companies can now be __________ just as easily as they can be sued for security compromises.
Sued for privacy violations
SYN Flooding
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Not rigid
44. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Test virus
Symmetric algorithm
Cramming
Environmental
45. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
SLE - Single Loss Expectancy
IANA
Ethernet
Symmetric algorithm
46. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
Email
One way hash
Directive
SET
47. Committing computer crimes in such small doses that they almost go unnoticed.
Salami attack
Environmental
Passwords
Preserve electronic evidence and protect it from any alteration
48. A standardized list of the most common security weaknesses and exploits is the __________.
Cramming
CHAP
PGP
CVE - Common Vulnerabilities and Exposures
49. ____ members of the staff need to be educated in disaster recovery procedures.
Separation of Duties
Passfilt.dll
Confidentiality
All
50. A true network security audit does include an audit for _____________
Not rigid
NT Audit events
modems
product development life cycle
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests