Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.






2. Cable modems are ___________than DSL connections






3. Smart cards are a secure alternative to which weak security mechanism?






4. S/MIME was developed for the protection of what communication mechanism(s)?






5. ______________ relates to the concept of protecting data from unauthorized users.






6. ________ is the authoritative entity which lists port assignments






7. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.






8. They specifically target telephone networks






9. Code Review - Certification - Accreditation - Functional Design Review - System Test Review






10. Macintosh computers are _____ at risk for receiving viruses.






11. What security principle is based on the division of job responsibilities - designed to prevent fraud?






12. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?






13. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?






14. Layer 4 of the OSI model corresponds to which layer of the DoD model?






15. ______________ is a major component of an overall risk management program.






16. Digital Certificates use which protocol?






17. A ______________ is an electronically generated record that ties a user's ID to their public key.






18. A type of virus that resides in a Word or Excel document is called a ___________ virus?






19. The __________ is the most dangerous part of a virus program.






20. Which organization(s) are responsible for the timely distribution of information security intelligence data?






21. ___________________ is responsible for creating security policies and for communicating those policies to system users.






22. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.






23. The IDEA algorithm (used in PGP) is _______ bits long.






24. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______






25. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.






26. _______________ supply AV engines with false information to avoid detection






27. Name two types of Intrusion Detection Systems






28. There are 65536 _________






29. __________ is a tool used by network administrators to capture packets from a network.






30. Examples of One- Time Password technology






31. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.






32. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis






33. Types of firewalls: Packet Filtering - Application Proxy - and _________________.






34. So far - no one has been able to crack the ____________ with Brute Force.






35. The ultimate goal of a computer forensics specialist is to ___________________.






36. ____ members of the staff need to be educated in disaster recovery procedures.






37. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






38. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.






39. A standardized list of the most common security weaknesses and exploits is the __________.






40. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.






41. Stealth viruses live in memory while __________ are written to disk






42. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?






43. One method that can reduce exposure to malicious code is to ___________________






44. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?






45. Vulnerability x Threat = RISK is an example of the _______________.






46. A Security Reference Monitor relates to which DoD security standard?






47. Combine both boot and file virus behavior






48. An attempt to break an encryption algorithm is called _____________.






49. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN






50. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down