SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the main difference between computer abuse and computer crime?
Intentions of the perpetrator
Main goal of a risk management program
Environmental
Sniffer
2. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Protection of data from unauthorized users
Data Classification
S/Key - OPIE
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
3. ____________ is a file system that was poorly designed and has numerous security flaws.
TIGER
One way hash
NFS
Cramming
4. Committing computer crimes in such small doses that they almost go unnoticed.
Salami attack
Email
SYN Flooding
Certificate
5. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
SET
Protection of data from unauthorized users
Business enabler
X.509
6. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?
Business enabler
Man In The Middle
Unix / Linux based security tools?
Verisign - Microsoft - Dell
7. ______________ is a major component of an overall risk management program.
Presentation Layer - L6
RSA
Risk assessment
Unix / Linux based security tools?
8. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
MAC - Mandatory Access Control
S/Key - OPIE
Authorization
Information
9. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
RSA
Cramming
Not rigid
ISO
10. Which of the following is NOT and encryption algorithm?
Off site in a climate controlled area
SSL
Social Engineering
IDEA algorithm
11. The IDEA algorithm (used in PGP) is _______ bits long.
Information
Sniffer
128
CERT - SANS - CERIAS - COAST
12. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Verisign - Microsoft - Dell
involves only computer to computer transactions
product development life cycle
Warning Banner
13. RSA is not based on a ________
Off site in a climate controlled area
TIGER
Available service ports
Symmetric algorithm
14. A formula used in Quantitative risk analysis
All
SLE - Single Loss Expectancy
Wild
Verisign - Microsoft - Dell
15. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Gathering digital evidence
Directive
Buffer Overflow
Cramming
16. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
involves only computer to computer transactions
SET
Not rigid
Polymorphic
17. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Detective
Less secure
CRACK
Test virus
18. So far - no one has been able to crack the ____________ with Brute Force.
Polymorphic
IDEA algorithm
Stateful Inspection
Stealth viruses
19. ____ members of the staff need to be educated in disaster recovery procedures.
Symmetric algorithm
Phreaks
Virus definition downloads and system virus scans
All
20. HTTP - FTP - SMTP reside at which layer of the OSI model?
Log files
Warning banners
Layer 7 - Application
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
21. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
Decentralized access control
One way hash
CERT - SANS - CERIAS - COAST
CHAP
22. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Gathering digital evidence
CERT - SANS - CERIAS - COAST
Layer 3 - Host to Host
A PGP Signed message
23. ___________________ viruses change the code order of the strain each time they replicate to another machine.
One way hash
Polymorphic
Depcrypting
X.509
24. The __________ is the most dangerous part of a virus program.
Payload
Cramming
Salami attack
SSL
25. Stealth viruses live in memory while __________ are written to disk
NT Audit events
Layer 7 - Application
Polymorphic
Logic bombs
26. An attempt to break an encryption algorithm is called _____________.
Sued for privacy violations
Risk assessment
Gathering digital evidence
Cryptanalysis
27. Countermeasures address security concerns in this category
Buffer Overflow
Depcrypting
Information
Layer 3 - Host to Host
28. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Host based - network based
Buffer Overflow
S/Key - OPIE
Password audit
29. Smart cards are a secure alternative to which weak security mechanism?
128
Less secure
SSL
Passwords
30. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down
Stateful Inspection
Social Engineering
Ethernet
a good password policy
31. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
Off site in a climate controlled area
SSL
Authentication
Users can gain access to any resource upon request (assuming they have proper permissions)
32. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
Risk assessment
SLE - Single Loss Expectancy
DSS - Digital Signature Standard
Environmental
33. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
Ethernet
Man In The Middle
Symmetric algorithm
To make user certificates available to others
34. A one way hash converts a string of random length into a _______________ encrypted string.
Fixed length
Personal Firewall - IDS - host based - Antivirus
RADIUS
Data Hiding
35. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
Verisign - Microsoft - Dell
Not rigid
Sued for privacy violations
DSS - Digital Signature Standard
36. Information security policies are a ___________________.
Not very difficult to break.
Business enabler
NFS
Unix / Linux based security tools?
37. The ability to adjust access control to the exact amount of permission necessary is called ______________.
Risk Equation
Preserve electronic evidence and protect it from any alteration
Granularity
Not very difficult to break.
38. This free (for personal use) program is used to encrypt and decrypt emails.
Stealth viruses
PGP
Environmental
Certificate
39. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
Privacy violations
All
Directive
Depcrypting
40. A ______________ is an electronically generated record that ties a user's ID to their public key.
Certificate
Social Engineering
Data Classification
Risk assessment
41. ________ is the authoritative entity which lists port assignments
Not very difficult to break.
Host based - network based
DAC - Discretionary Access Control
IANA
42. Organizations that can be a valid Certificate Authority (CA)
Password audit
SLE - Single Loss Expectancy
Risk assessment
Verisign - Microsoft - Dell
43. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas
Wild
Confidentiality
Quantitative analysis
Layer 3 - Host to Host
44. Accounting - Authentication - and ____________ are the AAAs of information security.
Authorization
Password audit
Accountability
Prevent - Recover - Detect
45. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______
Directive
Passfilt.dll
SLE - Single Loss Expectancy
Reboot or system startup
46. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
Biometrics
RSA
Confidentiality
Environmental
47. The ability to identify and audit a user and his / her actions is known as ____________.
Accountability
Layer 7 - Application
Environmental
Off site in a climate controlled area
48. Which range defines 'well known ports?'
Risk Equation
IPSEC
0-1023
Preserve electronic evidence and protect it from any alteration
49. __________ is a tool used by network administrators to capture packets from a network.
Also
Sniffer
Password audit
Multi-partite viruses
50. A standardized list of the most common security weaknesses and exploits is the __________.
CVE - Common Vulnerabilities and Exposures
Intrusion Detection System
Not rigid
Fixed length