SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A true network security audit does include an audit for _____________
IDEA algorithm
0-1023
modems
PGP
2. Digital Certificates use which protocol?
run applications as generic accounts with little or no privileges.
X.509
Salami attack
IANA
3. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
NT Audit events
Virus definition downloads and system virus scans
Unix / Linux based security tools?
Warning banners
4. An intrusion detection system is an example of what type of countermeasure?
Stealth viruses
Host based - network based
Detective
Personal Firewall - IDS - host based - Antivirus
5. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Multi-partite viruses
Stateful Inspection
Available service ports
Test virus
6. The ultimate goal of a computer forensics specialist is to ___________________.
run applications as generic accounts with little or no privileges.
X.509
Data Hiding
Preserve electronic evidence and protect it from any alteration
7. ________ is the authoritative entity which lists port assignments
Data Hiding
Host based - network based
Depcrypting
IANA
8. Which layer of the OSI model handles encryption?
Passfilt.dll
Presentation Layer - L6
Unix / Linux based security tools?
involves only computer to computer transactions
9. Logon and Logoff - Use of User Rights - Security Policy Change
Wild
NT Audit events
Residual risk
Available service ports
10. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
Intrusion Detection System
Confidentiality - Availability -Integrity of data
Wild
Stateful Inspection
11. A Security Reference Monitor relates to which DoD security standard?
C2
Environmental
SYN Flooding
DSS - Digital Signature Standard
12. Which of the following is NOT and encryption algorithm?
Directive
SSL
Protection of data from unauthorized users
Cisco
13. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
SSL
Cramming
DSS - Digital Signature Standard
Business enabler
14. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
Ethernet
Host based - network based
CVE - Common Vulnerabilities and Exposures
IANA
15. ______________ is a major component of an overall risk management program.
Risk assessment
Buffer Overflow
Less secure
Warning banners
16. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
Cisco
X.509
Email
Test virus
17. The __________ is the most dangerous part of a virus program.
CERT - SANS - CERIAS - COAST
Payload
Unix / Linux based security tools?
Available service ports
18. A one way hash converts a string of random length into a _______________ encrypted string.
Intrusion Detection System
Fixed length
PGP
Risk Equation
19. Macintosh computers are _____ at risk for receiving viruses.
Off site in a climate controlled area
Also
To make user certificates available to others
Confidentiality
20. The most secure method for storing backup tapes is?
Stateful Inspection
Off site in a climate controlled area
128
Virus definition downloads and system virus scans
21. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Data Hiding
involves only computer to computer transactions
Information
Less secure
22. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
Main goal of a risk management program
Intrusion Detection System
Personal Firewall - IDS - host based - Antivirus
Cisco
23. Smart cards are a secure alternative to which weak security mechanism?
NT Audit events
Passive network attack
RSA
Passwords
24. S/MIME was developed for the protection of what communication mechanism(s)?
Email
Cramming
Logic bombs
Information
25. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Symmetric algorithm
Decentralized access control
Preserve electronic evidence and protect it from any alteration
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
26. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Business enabler
Host based - network based
S/Key - OPIE
Polymorphic
27. ___________________ is responsible for creating security policies and for communicating those policies to system users.
Confidentiality
Decentralized access control
Social Engineering
ISO
28. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Test virus
To make user certificates available to others
Biometrics
Main goal of a risk management program
29. ____________ is a file system that was poorly designed and has numerous security flaws.
Cramming
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Preserve electronic evidence and protect it from any alteration
NFS
30. Name two types of Intrusion Detection Systems
SYN Flooding
CHAP
Host based - network based
Salami attack
31. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Prevent - Recover - Detect
Email
Mobile
Users can gain access to any resource upon request (assuming they have proper permissions)
32. An attempt to break an encryption algorithm is called _____________.
Stealth viruses
Log files
Cryptanalysis
Information
33. Stealth viruses live in memory while __________ are written to disk
Logic bombs
Warning banners
Virus definition downloads and system virus scans
MAC - Mandatory Access Control
34. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
Logic bombs
IPSEC
A PGP Signed message
SET
35. Remote Access Dial-in User Service
RADIUS
IDEA algorithm
Stateful Inspection
Virus definition downloads and system virus scans
36. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
Fixed length
Man In The Middle
MAC - Mandatory Access Control
Sniffer
37. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
Assignment
X.509
Main goal of a risk management program
involves only computer to computer transactions
38. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
S/Key - OPIE
Acceptance - Transfer - Mitigate
Directive
DAC - Discretionary Access Control
39. Today - ______________ are almost as serious as security violations
All
Information Security policies
Privacy violations
Confidentiality - Availability -Integrity of data
40. Identifying specific attempts to penetrate systems is the function of the _______________.
Unix / Linux based security tools?
Intrusion Detection System
Wild
Depcrypting
41. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Social Engineering
Steps in handling incidents
Acceptance - Transfer - Mitigate
IDEA algorithm
42. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______
Passfilt.dll
To make user certificates available to others
Phreaks
Separation of Duties
43. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
CHAP
Configuration Control
Decentralized access control
Risk assessment
44. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Macro
CRACK
a good password policy
Not rigid
45. Accounting - Authentication - and ____________ are the AAAs of information security.
Separation of Duties
Authorization
Depcrypting
Confidentiality - Availability -Integrity of data
46. Information security policies are a ___________________.
Biometrics
Business enabler
Users can gain access to any resource upon request (assuming they have proper permissions)
Symmetric algorithm
47. These should be done on a weekly basis
Residual risk
Virus definition downloads and system virus scans
PGP
Privacy violations
48. ____ members of the staff need to be educated in disaster recovery procedures.
Passfilt.dll
All
RSA
SET
49. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Prevent - Recover - Detect
Host based - network based
CERT - SANS - CERIAS - COAST
S/Key - OPIE
50. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
Logic bombs
RSA
Fixed length
MAC - Mandatory Access Control
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests