SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
SYN Flooding
Configuration Control
Email
Risk assessment
2. ______________ is a Unix security scanning tool developed at Texas A&M university.
TIGER
DSS - Digital Signature Standard
Intentions of the perpetrator
Depcrypting
3. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Wild
NFS
DAC - Discretionary Access Control
Test virus
4. It is difficult to prosecute a computer criminal if _________ are not deployed
X.509
Warning banners
NFS
Separation of Duties
5. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.
Layer 7 - Application
DAC - Discretionary Access Control
Reboot or system startup
Social Engineering
6. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
SSL
Granularity
Virus definition downloads and system virus scans
A PGP Signed message
7. Countermeasures' main objectives
Not rigid
Less secure
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Prevent - Recover - Detect
8. An intrusion detection system is an example of what type of countermeasure?
Detective
Multi-partite viruses
DSS - Digital Signature Standard
To make user certificates available to others
9. RSA is not based on a ________
Risk assessment
Gathering digital evidence
Stealth viruses
Symmetric algorithm
10. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.
Passwords
0-1023
Wild
Business enabler
11. Which of the following is NOT and encryption algorithm?
SSL
Ethernet
NFS
SET
12. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
Cramming
IANA
NT Audit events
Intentions of the perpetrator
13. Digital Certificates use which protocol?
C2
Reboot or system startup
Risk assessment
X.509
14. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Confidentiality
Social Engineering
Gathering digital evidence
Intentions of the perpetrator
15. A standardized list of the most common security weaknesses and exploits is the __________.
All
Confidentiality - Availability -Integrity of data
Unix / Linux based security tools?
CVE - Common Vulnerabilities and Exposures
16. Which range defines 'well known ports?'
Prevent - Recover - Detect
0-1023
CVE - Common Vulnerabilities and Exposures
Decentralized access control
17. A ______________ is an electronically generated record that ties a user's ID to their public key.
Certificate
RSA
Presentation Layer - L6
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
18. The ability to adjust access control to the exact amount of permission necessary is called ______________.
Granularity
Also
0-1023
Verisign - Microsoft - Dell
19. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Layer 3 - Host to Host
Less secure
Macro
Test virus
20. Data being delivered from the source to the intended receiver without being altered
Gathering digital evidence
Protection of data from unauthorized users
Passfilt.dll
Presentation Layer - L6
21. The IDEA algorithm (used in PGP) is _______ bits long.
C2
Passwords
Cramming
128
22. Contain - Recover - Review - Identify - Prepare
Steps in handling incidents
Cisco
Sniffer
Also
23. The most secure method for storing backup tapes is?
Off site in a climate controlled area
ISO
Available service ports
Business enabler
24. Committing computer crimes in such small doses that they almost go unnoticed.
Salami attack
Warning banners
IPSEC
Reboot or system startup
25. Layer 4 of the OSI model corresponds to which layer of the DoD model?
Layer 3 - Host to Host
Depcrypting
Authorization
Man In The Middle
26. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
Authentication
Passwords
S/Key - OPIE
Directive
27. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas
Macro
Acceptance - Transfer - Mitigate
Confidentiality - Availability -Integrity of data
Quantitative analysis
28. There are 65536 _________
Directive
DAC - Discretionary Access Control
Acceptance - Transfer - Mitigate
Available service ports
29. ______________ is a major component of an overall risk management program.
Hoaxes
Users can gain access to any resource upon request (assuming they have proper permissions)
Unix / Linux based security tools?
Risk assessment
30. What security principle is based on the division of job responsibilities - designed to prevent fraud?
Salami attack
Separation of Duties
Social Engineering
Not rigid
31. Macintosh computers are _____ at risk for receiving viruses.
MAC - Mandatory Access Control
Also
Business enabler
Information Security policies
32. Remote Access Dial-in User Service
modems
RADIUS
Authentication
Intrusion Detection System
33. Countermeasures address security concerns in this category
Information
Preserve electronic evidence and protect it from any alteration
Presentation Layer - L6
Gathering digital evidence
34. Name two types of Intrusion Detection Systems
Host based - network based
Intrusion Detection System
Fixed length
Passfilt.dll
35. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
run applications as generic accounts with little or no privileges.
Password audit
CERT - SANS - CERIAS - COAST
SET
36. Accounting - Authentication - and ____________ are the AAAs of information security.
Authorization
Virus definition downloads and system virus scans
RADIUS
CERT - SANS - CERIAS - COAST
37. Ways to deal with risk.
Warning banners
Multi-partite viruses
Intentions of the perpetrator
Acceptance - Transfer - Mitigate
38. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
To make user certificates available to others
Stealth viruses
Cisco
Warning Banner
39. __________ is a tool used by network administrators to capture packets from a network.
Mobile
Social Engineering
Sniffer
modems
40. DES - Data Encryption standard has a 128 bit key and is ________
Not very difficult to break.
Less secure
CRACK
modems
41. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
SLE - Single Loss Expectancy
Gathering digital evidence
Payload
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
42. S/MIME was developed for the protection of what communication mechanism(s)?
Email
TIGER
Macro
Directive
43. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
RSA
IPSEC
Macro
Granularity
44. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down
Reboot or system startup
a good password policy
CHAP
Ethernet
45. They specifically target telephone networks
Mobile
Cryptanalysis
Unix / Linux based security tools?
Phreaks
46. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
Cisco
product development life cycle
Acceptance - Transfer - Mitigate
involves only computer to computer transactions
47. Smart cards are a secure alternative to which weak security mechanism?
Passwords
Not rigid
Sued for privacy violations
SLE - Single Loss Expectancy
48. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Warning banners
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Buffer Overflow
Cryptanalysis
49. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
Protection of data from unauthorized users
Unix / Linux based security tools?
Layer 7 - Application
Confidentiality - Availability -Integrity of data
50. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
Warning banners
Personal Firewall - IDS - host based - Antivirus
Cramming
Payload
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests