SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. _______________ supply AV engines with false information to avoid detection
To make user certificates available to others
Information
Stealth viruses
Unix / Linux based security tools?
2. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Accountability
Detective
Hoaxes
Data Hiding
3. The ability to adjust access control to the exact amount of permission necessary is called ______________.
involves only computer to computer transactions
RADIUS
IANA
Granularity
4. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?
modems
run applications as generic accounts with little or no privileges.
MAC - Mandatory Access Control
Man In The Middle
5. These should be done on a weekly basis
0-1023
Cisco
Data Classification
Virus definition downloads and system virus scans
6. __________ is the most famous Unix password cracking tool.
Authentication
CRACK
CVE - Common Vulnerabilities and Exposures
Risk Equation
7. This free (for personal use) program is used to encrypt and decrypt emails.
Privacy violations
PGP
Risk Equation
Social Engineering
8. Cable modems are ___________than DSL connections
Password audit
Fixed length
Less secure
Log files
9. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Presentation Layer - L6
To make user certificates available to others
Configuration Control
10. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Polymorphic
Salami attack
Symmetric algorithm
Business enabler
11. The __________ is the most dangerous part of a virus program.
NT Audit events
Separation of Duties
Depcrypting
Payload
12. ___________________ is responsible for creating security policies and for communicating those policies to system users.
RSA
ISO
CRACK
Privacy violations
13. Allows File owners to determine access rights.
Decentralized access control
CRACK
SYN Flooding
SLE - Single Loss Expectancy
14. Vulnerability x Threat = RISK is an example of the _______________.
Symmetric algorithm
Test virus
Risk Equation
Verisign - Microsoft - Dell
15. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
SYN Flooding
Passwords
Separation of Duties
Prevent - Recover - Detect
16. Organizations that can be a valid Certificate Authority (CA)
Preserve electronic evidence and protect it from any alteration
Multi-partite viruses
Hoaxes
Verisign - Microsoft - Dell
17. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
ISO
Salami attack
Host based - network based
Social Engineering
18. Layer 4 of the OSI model corresponds to which layer of the DoD model?
Warning Banner
Test virus
Warning banners
Layer 3 - Host to Host
19. Which organization(s) are responsible for the timely distribution of information security intelligence data?
CERT - SANS - CERIAS - COAST
Virus definition downloads and system virus scans
Risk assessment
Sued for privacy violations
20. Countermeasures address security concerns in this category
A PGP Signed message
Email
Information
Warning banners
21. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
Symmetric algorithm
Unix / Linux based security tools?
Intentions of the perpetrator
Social Engineering
22. Main goals of an information security program
Authentication
Confidentiality - Availability -Integrity of data
Steps in handling incidents
Presentation Layer - L6
23. The ultimate goal of a computer forensics specialist is to ___________________.
Acceptance - Transfer - Mitigate
Stealth viruses
Quantitative analysis
Preserve electronic evidence and protect it from any alteration
24. HTTP - FTP - SMTP reside at which layer of the OSI model?
0-1023
Symmetric algorithm
DSS - Digital Signature Standard
Layer 7 - Application
25. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Available service ports
CRACK
CVE - Common Vulnerabilities and Exposures
Gathering digital evidence
26. What security principle is based on the division of job responsibilities - designed to prevent fraud?
Test virus
Wild
Separation of Duties
0-1023
27. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?
Polymorphic
Salami attack
Payload
Configuration Control
28. They specifically target telephone networks
Phreaks
Prevent - Recover - Detect
Granularity
Risk assessment
29. MD5 is a ___________ algorithm
Certificate
Reboot or system startup
RADIUS
One way hash
30. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Password audit
Passwords
Personal Firewall - IDS - host based - Antivirus
31. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
SET
Confidentiality - Availability -Integrity of data
Presentation Layer - L6
Social Engineering
32. A ______________ is an electronically generated record that ties a user's ID to their public key.
CHAP
Certificate
Not very difficult to break.
DSS - Digital Signature Standard
33. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Buffer Overflow
Log files
Social Engineering
Information
34. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Certificate
Mobile
RADIUS
Depcrypting
35. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
Hoaxes
Ethernet
One way hash
Intrusion Detection System
36. Smart cards are a secure alternative to which weak security mechanism?
Passwords
Layer 3 - Host to Host
Data Classification
Mobile
37. Digital Certificates use which protocol?
To make user certificates available to others
Mobile
Social Engineering
X.509
38. An attempt to break an encryption algorithm is called _____________.
C2
Cryptanalysis
Polymorphic
Off site in a climate controlled area
39. It is difficult to prosecute a computer criminal if _________ are not deployed
Warning banners
IDEA algorithm
Passive network attack
0-1023
40. A one way hash converts a string of random length into a _______________ encrypted string.
Fixed length
Main goal of a risk management program
Risk Equation
Layer 7 - Application
41. Macintosh computers are _____ at risk for receiving viruses.
Cramming
Log files
Also
IPSEC
42. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
Cramming
S/Key - OPIE
Preserve electronic evidence and protect it from any alteration
Hoaxes
43. Countermeasures' main objectives
Multi-partite viruses
Prevent - Recover - Detect
Intentions of the perpetrator
RADIUS
44. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
TIGER
RSA
CVE - Common Vulnerabilities and Exposures
Authentication
45. RSA is not based on a ________
SSL
Layer 3 - Host to Host
Password audit
Symmetric algorithm
46. There are 5 classes of IP addresses available - but only 3 classes are in common use today
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
a good password policy
Granularity
Confidentiality - Availability -Integrity of data
47. Identifying specific attempts to penetrate systems is the function of the _______________.
Certificate
Intrusion Detection System
128
TIGER
48. Logon and Logoff - Use of User Rights - Security Policy Change
Cisco
Decentralized access control
Preserve electronic evidence and protect it from any alteration
NT Audit events
49. The IDEA algorithm (used in PGP) is _______ bits long.
128
Data Hiding
Man In The Middle
Wild
50. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
RSA
Hackers and crackers
Intentions of the perpetrator
Host based - network based
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests