SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
CHAP
Also
Certificate
RSA
2. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
RADIUS
Intrusion Detection System
product development life cycle
Multi-partite viruses
3. __________ is the most famous Unix password cracking tool.
Buffer Overflow
CRACK
Warning banners
Phreaks
4. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
C2
Environmental
X.509
CERT - SANS - CERIAS - COAST
5. Logon and Logoff - Use of User Rights - Security Policy Change
Gathering digital evidence
Cisco
IDEA algorithm
NT Audit events
6. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
Hackers and crackers
Password audit
Fixed length
Not rigid
7. An attempt to break an encryption algorithm is called _____________.
Cryptanalysis
RADIUS
S/Key - OPIE
Fixed length
8. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.
CHAP
MAC - Mandatory Access Control
Not rigid
DAC - Discretionary Access Control
9. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
Passive network attack
Risk Equation
SYN Flooding
Preserve electronic evidence and protect it from any alteration
10. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
Prevent - Recover - Detect
CHAP
A PGP Signed message
Decentralized access control
11. A one way hash converts a string of random length into a _______________ encrypted string.
Warning Banner
Fixed length
Logic bombs
X.509
12. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
involves only computer to computer transactions
Unix / Linux based security tools?
Verisign - Microsoft - Dell
a good password policy
13. The most secure method for storing backup tapes is?
Off site in a climate controlled area
Virus definition downloads and system virus scans
PGP
modems
14. Remote Access Dial-in User Service
MAC - Mandatory Access Control
RADIUS
Privacy violations
C2
15. These should be done on a weekly basis
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Preserve electronic evidence and protect it from any alteration
Business enabler
Virus definition downloads and system virus scans
16. IKE - Internet Key Exchange is often used in conjunction with what security standard?
Information
Separation of Duties
CRACK
IPSEC
17. Stealth viruses live in memory while __________ are written to disk
SSL
Risk Equation
Logic bombs
Data Hiding
18. RSA is not based on a ________
Verisign - Microsoft - Dell
Symmetric algorithm
Less secure
Fixed length
19. _______________ supply AV engines with false information to avoid detection
a good password policy
Prevent - Recover - Detect
Stealth viruses
Residual risk
20. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
A PGP Signed message
Depcrypting
Buffer Overflow
DSS - Digital Signature Standard
21. An intrusion detection system is an example of what type of countermeasure?
Prevent - Recover - Detect
IPSEC
Multi-partite viruses
Detective
22. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?
Acceptance - Transfer - Mitigate
Protection of data from unauthorized users
Configuration Control
Authorization
23. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Biometrics
DAC - Discretionary Access Control
Test virus
MAC - Mandatory Access Control
24. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas
CRACK
Risk Equation
DAC - Discretionary Access Control
Quantitative analysis
25. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
ISO
IPSEC
Email
Information Security policies
26. A true network security audit does include an audit for _____________
modems
Buffer Overflow
Layer 7 - Application
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
27. Which of the following is NOT and encryption algorithm?
SSL
Quantitative analysis
Sued for privacy violations
Separation of Duties
28. What is the main difference between computer abuse and computer crime?
Privacy violations
Intentions of the perpetrator
modems
SYN Flooding
29. There are 65536 _________
Available service ports
Preserve electronic evidence and protect it from any alteration
Directive
Password audit
30. A Security Reference Monitor relates to which DoD security standard?
Test virus
To make user certificates available to others
C2
IANA
31. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Quantitative analysis
CERT - SANS - CERIAS - COAST
Risk assessment
Personal Firewall - IDS - host based - Antivirus
32. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
Preserve electronic evidence and protect it from any alteration
Intentions of the perpetrator
Personal Firewall - IDS - host based - Antivirus
SET
33. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
product development life cycle
SLE - Single Loss Expectancy
Intentions of the perpetrator
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
34. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Hackers and crackers
Personal Firewall - IDS - host based - Antivirus
Business enabler
DSS - Digital Signature Standard
35. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
SET
Users can gain access to any resource upon request (assuming they have proper permissions)
CHAP
Warning Banner
36. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
Main goal of a risk management program
CRACK
Ethernet
Sniffer
37. Accounting - Authentication - and ____________ are the AAAs of information security.
Cisco
Unix / Linux based security tools?
run applications as generic accounts with little or no privileges.
Authorization
38. Name two types of Intrusion Detection Systems
Host based - network based
Email
Buffer Overflow
Personal Firewall - IDS - host based - Antivirus
39. ___________________ is responsible for creating security policies and for communicating those policies to system users.
ISO
Macro
Warning Banner
Phreaks
40. One method that can reduce exposure to malicious code is to ___________________
Cisco
S/Key - OPIE
Preserve electronic evidence and protect it from any alteration
run applications as generic accounts with little or no privileges.
41. Wiretapping is an example of a ________.
Decentralized access control
Passive network attack
Acceptance - Transfer - Mitigate
Separation of Duties
42. Ways to deal with risk.
Email
Host based - network based
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Acceptance - Transfer - Mitigate
43. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Not very difficult to break.
Polymorphic
CERT - SANS - CERIAS - COAST
involves only computer to computer transactions
44. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Authentication
Unix / Linux based security tools?
A PGP Signed message
45. The ability to identify and audit a user and his / her actions is known as ____________.
Accountability
Passwords
Configuration Control
CVE - Common Vulnerabilities and Exposures
46. Today - ______________ are almost as serious as security violations
Privacy violations
Unix / Linux based security tools?
Host based - network based
Confidentiality
47. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?
Fixed length
Man In The Middle
Logic bombs
a good password policy
48. Organizations that can be a valid Certificate Authority (CA)
Users can gain access to any resource upon request (assuming they have proper permissions)
Verisign - Microsoft - Dell
Test virus
Intrusion Detection System
49. Which layer of the OSI model handles encryption?
Detective
Warning banners
Presentation Layer - L6
Decentralized access control
50. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Fixed length
SET
Users can gain access to any resource upon request (assuming they have proper permissions)
Test virus
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests