Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wiretapping is an example of a ________.






2. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.






3. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?






4. Logon and Logoff - Use of User Rights - Security Policy Change






5. Identifying specific attempts to penetrate systems is the function of the _______________.






6. Which of the following is NOT and encryption algorithm?






7. The IDEA algorithm (used in PGP) is _______ bits long.






8. What security principle is based on the division of job responsibilities - designed to prevent fraud?






9. A true network security audit does include an audit for _____________






10. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






11. Which of the concepts best describes Availability in relation to computer resources?






12. Digital Certificates use which protocol?






13. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.






14. Examples of One- Time Password technology






15. Accounting - Authentication - and ____________ are the AAAs of information security.






16. A ______________ is an electronically generated record that ties a user's ID to their public key.






17. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______






18. Name two types of Intrusion Detection Systems






19. So far - no one has been able to crack the ____________ with Brute Force.






20. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.






21. The ability to adjust access control to the exact amount of permission necessary is called ______________.






22. Combine both boot and file virus behavior






23. A one way hash converts a string of random length into a _______________ encrypted string.






24. IKE - Internet Key Exchange is often used in conjunction with what security standard?






25. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?






26. It is difficult to prosecute a computer criminal if _________ are not deployed






27. RSA is not based on a ________






28. Today - ______________ are almost as serious as security violations






29. To help managers find the correct cost balance between risks and countermeasures






30. Remote Access Dial-in User Service






31. Organizations that can be a valid Certificate Authority (CA)






32. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy






33. Committing computer crimes in such small doses that they almost go unnoticed.






34. Vulnerability x Threat = RISK is an example of the _______________.






35. Information security policies are a ___________________.






36. A type of virus that resides in a Word or Excel document is called a ___________ virus?






37. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis






38. S/MIME was developed for the protection of what communication mechanism(s)?






39. Allows File owners to determine access rights.






40. A standardized list of the most common security weaknesses and exploits is the __________.






41. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.






42. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.






43. Types of firewalls: Packet Filtering - Application Proxy - and _________________.






44. ___________________ is responsible for creating security policies and for communicating those policies to system users.






45. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.






46. There are 5 classes of IP addresses available - but only 3 classes are in common use today






47. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?






48. Code Review - Certification - Accreditation - Functional Design Review - System Test Review






49. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?






50. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas