SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Main goals of an information security program
Data Hiding
Confidentiality - Availability -Integrity of data
Password audit
Cisco
2. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Stealth viruses
Buffer Overflow
RSA
Gathering digital evidence
3. ______________ is a Unix security scanning tool developed at Texas A&M university.
Assignment
Available service ports
TIGER
Configuration Control
4. They specifically target telephone networks
Phreaks
CERT - SANS - CERIAS - COAST
Wild
Also
5. Layer 4 of the OSI model corresponds to which layer of the DoD model?
Layer 3 - Host to Host
Business enabler
To make user certificates available to others
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
6. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
IANA
Password audit
Host based - network based
Also
7. Countermeasures' main objectives
Gathering digital evidence
Prevent - Recover - Detect
Intrusion Detection System
Phreaks
8. ____ members of the staff need to be educated in disaster recovery procedures.
product development life cycle
Accountability
Acceptance - Transfer - Mitigate
All
9. To help managers find the correct cost balance between risks and countermeasures
Not rigid
Main goal of a risk management program
To make user certificates available to others
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
10. HTTP - FTP - SMTP reside at which layer of the OSI model?
Acceptance - Transfer - Mitigate
Logic bombs
Layer 7 - Application
SYN Flooding
11. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
Ethernet
Data Classification
Not rigid
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
12. Countermeasures address security concerns in this category
Information
Phreaks
RSA
SET
13. ______________ is a major component of an overall risk management program.
Presentation Layer - L6
Email
Risk assessment
128
14. ________ is the authoritative entity which lists port assignments
IANA
SSL
Cisco
Ethernet
15. __________ is a tool used by network administrators to capture packets from a network.
All
Sniffer
Social Engineering
Prevent - Recover - Detect
16. Combine both boot and file virus behavior
Reboot or system startup
Multi-partite viruses
SYN Flooding
0-1023
17. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
Certificate
Social Engineering
product development life cycle
Information
18. A one way hash converts a string of random length into a _______________ encrypted string.
Fixed length
Unix / Linux based security tools?
Passwords
Directive
19. Which of the concepts best describes Availability in relation to computer resources?
Not very difficult to break.
Authentication
Also
Users can gain access to any resource upon request (assuming they have proper permissions)
20. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
Gathering digital evidence
Assignment
CRACK
Confidentiality - Availability -Integrity of data
21. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Log files
Assignment
Layer 3 - Host to Host
Acceptance - Transfer - Mitigate
22. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
Intrusion Detection System
To make user certificates available to others
Fixed length
Risk Equation
23. Remote Access Dial-in User Service
128
SET
Warning banners
RADIUS
24. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down
CHAP
a good password policy
Buffer Overflow
Sniffer
25. A standardized list of the most common security weaknesses and exploits is the __________.
Accountability
Multi-partite viruses
CVE - Common Vulnerabilities and Exposures
CERT - SANS - CERIAS - COAST
26. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Biometrics
Granularity
Separation of Duties
Polymorphic
27. DES - Data Encryption standard has a 128 bit key and is ________
Not very difficult to break.
Information
Cryptanalysis
Personal Firewall - IDS - host based - Antivirus
28. Logon and Logoff - Use of User Rights - Security Policy Change
Email
Stateful Inspection
NT Audit events
Acceptance - Transfer - Mitigate
29. Which of the following is NOT and encryption algorithm?
SYN Flooding
Payload
SSL
Logic bombs
30. __________ is the most famous Unix password cracking tool.
X.509
Warning banners
CRACK
modems
31. So far - no one has been able to crack the ____________ with Brute Force.
CERT - SANS - CERIAS - COAST
Macro
Main goal of a risk management program
IDEA algorithm
32. An intrusion detection system is an example of what type of countermeasure?
Detective
Confidentiality
NT Audit events
a good password policy
33. Contain - Recover - Review - Identify - Prepare
IANA
Logic bombs
Buffer Overflow
Steps in handling incidents
34. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
SET
NT Audit events
To make user certificates available to others
Polymorphic
35. Wiretapping is an example of a ________.
Passive network attack
RSA
128
PGP
36. One method that can reduce exposure to malicious code is to ___________________
run applications as generic accounts with little or no privileges.
MAC - Mandatory Access Control
Main goal of a risk management program
Salami attack
37. The ability to adjust access control to the exact amount of permission necessary is called ______________.
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Information
Authorization
Granularity
38. IKE - Internet Key Exchange is often used in conjunction with what security standard?
Test virus
Prevent - Recover - Detect
IPSEC
Risk Equation
39. Accounting - Authentication - and ____________ are the AAAs of information security.
Virus definition downloads and system virus scans
Authorization
RADIUS
TIGER
40. S/MIME was developed for the protection of what communication mechanism(s)?
Directive
Data Classification
Multi-partite viruses
Email
41. There are 5 classes of IP addresses available - but only 3 classes are in common use today
Layer 7 - Application
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Detective
Warning Banner
42. What is the main difference between computer abuse and computer crime?
Configuration Control
Intentions of the perpetrator
Intrusion Detection System
Preserve electronic evidence and protect it from any alteration
43. Which range defines 'well known ports?'
Multi-partite viruses
One way hash
Sniffer
0-1023
44. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
RSA
Granularity
SET
modems
45. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas
Personal Firewall - IDS - host based - Antivirus
Quantitative analysis
DSS - Digital Signature Standard
Password audit
46. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
CHAP
Cramming
Hoaxes
C2
47. Public keys are used for encrypting messages and private keys are used for __________messages.
Depcrypting
Cisco
Intrusion Detection System
One way hash
48. Stealth viruses live in memory while __________ are written to disk
SYN Flooding
SET
Logic bombs
Test virus
49. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Gathering digital evidence
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Environmental
Risk Equation
50. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.
DAC - Discretionary Access Control
Configuration Control
Stealth viruses
Hoaxes