SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Payload
Information
Warning Banner
Fixed length
2. Contain - Recover - Review - Identify - Prepare
Test virus
Decentralized access control
Host based - network based
Steps in handling incidents
3. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
Sniffer
Authentication
Directive
Not rigid
4. A Security Reference Monitor relates to which DoD security standard?
Decentralized access control
CVE - Common Vulnerabilities and Exposures
Sued for privacy violations
C2
5. Combine both boot and file virus behavior
Symmetric algorithm
Multi-partite viruses
Logic bombs
Quantitative analysis
6. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
DSS - Digital Signature Standard
Symmetric algorithm
Prevent - Recover - Detect
Social Engineering
7. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Cramming
MAC - Mandatory Access Control
Stateful Inspection
Personal Firewall - IDS - host based - Antivirus
8. So far - no one has been able to crack the ____________ with Brute Force.
Stealth viruses
Layer 3 - Host to Host
IDEA algorithm
Cramming
9. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
RADIUS
IDEA algorithm
involves only computer to computer transactions
0-1023
10. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.
Cramming
Hoaxes
Wild
0-1023
11. The ability to adjust access control to the exact amount of permission necessary is called ______________.
X.509
Preserve electronic evidence and protect it from any alteration
Granularity
ISO
12. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas
Quantitative analysis
Multi-partite viruses
IANA
Main goal of a risk management program
13. ______________ relates to the concept of protecting data from unauthorized users.
Confidentiality
ISO
SLE - Single Loss Expectancy
Configuration Control
14. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
A PGP Signed message
PGP
Stateful Inspection
128
15. An attempt to break an encryption algorithm is called _____________.
Cryptanalysis
Preserve electronic evidence and protect it from any alteration
Hackers and crackers
CVE - Common Vulnerabilities and Exposures
16. ______________ is a Unix security scanning tool developed at Texas A&M university.
TIGER
NT Audit events
Authorization
Multi-partite viruses
17. __________ is the most famous Unix password cracking tool.
All
Authentication
CRACK
Cisco
18. Macintosh computers are _____ at risk for receiving viruses.
Information Security policies
Also
Log files
DAC - Discretionary Access Control
19. Vulnerability x Threat = RISK is an example of the _______________.
Protection of data from unauthorized users
Users can gain access to any resource upon request (assuming they have proper permissions)
Risk Equation
Ethernet
20. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Man In The Middle
Passwords
Ethernet
21. Organizations that can be a valid Certificate Authority (CA)
Presentation Layer - L6
Acceptance - Transfer - Mitigate
Verisign - Microsoft - Dell
Man In The Middle
22. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
Multi-partite viruses
Password audit
Cramming
Quantitative analysis
23. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Residual risk
Passfilt.dll
CERT - SANS - CERIAS - COAST
Certificate
24. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
Information Security policies
Data Classification
Steps in handling incidents
Accountability
25. Allows File owners to determine access rights.
Password audit
Decentralized access control
Passwords
128
26. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Mobile
Polymorphic
Detective
Host based - network based
27. IKE - Internet Key Exchange is often used in conjunction with what security standard?
Main goal of a risk management program
IPSEC
SSL
Assignment
28. The ability to identify and audit a user and his / her actions is known as ____________.
All
Accountability
Stateful Inspection
Unix / Linux based security tools?
29. What security principle is based on the division of job responsibilities - designed to prevent fraud?
Virus definition downloads and system virus scans
Accountability
MAC - Mandatory Access Control
Separation of Duties
30. Which of the following is NOT and encryption algorithm?
product development life cycle
SSL
Risk Equation
CRACK
31. There are 65536 _________
Protection of data from unauthorized users
Hackers and crackers
PGP
Available service ports
32. Companies can now be __________ just as easily as they can be sued for security compromises.
Sued for privacy violations
C2
S/Key - OPIE
TIGER
33. A standardized list of the most common security weaknesses and exploits is the __________.
Confidentiality
Decentralized access control
Available service ports
CVE - Common Vulnerabilities and Exposures
34. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
TIGER
RSA
IDEA algorithm
Fixed length
35. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?
NFS
Main goal of a risk management program
Mobile
Configuration Control
36. What is the main difference between computer abuse and computer crime?
modems
Prevent - Recover - Detect
Intentions of the perpetrator
Intrusion Detection System
37. The IDEA algorithm (used in PGP) is _______ bits long.
Data Classification
128
Unix / Linux based security tools?
Log files
38. Cable modems are ___________than DSL connections
Virus definition downloads and system virus scans
RSA
Less secure
SSL
39. Main goals of an information security program
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Confidentiality - Availability -Integrity of data
CHAP
Buffer Overflow
40. __________ is a tool used by network administrators to capture packets from a network.
Sniffer
S/Key - OPIE
involves only computer to computer transactions
Intrusion Detection System
41. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______
Data Classification
Passfilt.dll
Verisign - Microsoft - Dell
IANA
42. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Available service ports
Macro
Protection of data from unauthorized users
Accountability
43. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
Steps in handling incidents
Not rigid
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
SET
44. Ways to deal with risk.
IPSEC
Accountability
Acceptance - Transfer - Mitigate
Hoaxes
45. Wiretapping is an example of a ________.
Multi-partite viruses
product development life cycle
Passive network attack
SLE - Single Loss Expectancy
46. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
Certificate
Authentication
Information
Salami attack
47. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Macro
Hackers and crackers
Separation of Duties
Test virus
48. Today - ______________ are almost as serious as security violations
Salami attack
Cryptanalysis
Privacy violations
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
49. ___________________ is responsible for creating security policies and for communicating those policies to system users.
Confidentiality
CVE - Common Vulnerabilities and Exposures
ISO
Warning Banner
50. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Decentralized access control
Preserve electronic evidence and protect it from any alteration
Certificate
Polymorphic