SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
Password audit
Data Hiding
Log files
SYN Flooding
2. These should be done on a weekly basis
Hoaxes
Test virus
Virus definition downloads and system virus scans
Quantitative analysis
3. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Cisco
Stateful Inspection
Risk Equation
4. Contain - Recover - Review - Identify - Prepare
Steps in handling incidents
MAC - Mandatory Access Control
NT Audit events
Residual risk
5. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
To make user certificates available to others
Personal Firewall - IDS - host based - Antivirus
S/Key - OPIE
modems
6. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
Authorization
Buffer Overflow
Unix / Linux based security tools?
Stealth viruses
7. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
Not rigid
Granularity
IPSEC
SLE - Single Loss Expectancy
8. HTTP - FTP - SMTP reside at which layer of the OSI model?
Social Engineering
Information
Confidentiality - Availability -Integrity of data
Layer 7 - Application
9. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Mobile
Protection of data from unauthorized users
IANA
10. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
Cisco
Authentication
Separation of Duties
Off site in a climate controlled area
11. Countermeasures address security concerns in this category
0-1023
Steps in handling incidents
Information
Hoaxes
12. _______________ supply AV engines with false information to avoid detection
0-1023
Stealth viruses
Logic bombs
Residual risk
13. An intrusion detection system is an example of what type of countermeasure?
Salami attack
Detective
SYN Flooding
Social Engineering
14. The __________ is the most dangerous part of a virus program.
Layer 3 - Host to Host
Unix / Linux based security tools?
Payload
Detective
15. The most secure method for storing backup tapes is?
Off site in a climate controlled area
ISO
Email
Ethernet
16. A Security Reference Monitor relates to which DoD security standard?
Not rigid
Quantitative analysis
Fixed length
C2
17. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Buffer Overflow
Mobile
Not very difficult to break.
NFS
18. Macintosh computers are _____ at risk for receiving viruses.
Less secure
Passive network attack
Also
Acceptance - Transfer - Mitigate
19. A boot sector virus goes to work when what event takes place?
Risk Equation
Directive
Reboot or system startup
Data Hiding
20. The ultimate goal of a computer forensics specialist is to ___________________.
SET
Passwords
Preserve electronic evidence and protect it from any alteration
Host based - network based
21. They specifically target telephone networks
Phreaks
Less secure
Cisco
Protection of data from unauthorized users
22. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
modems
Less secure
Accountability
product development life cycle
23. Data being delivered from the source to the intended receiver without being altered
ISO
Reboot or system startup
Protection of data from unauthorized users
DAC - Discretionary Access Control
24. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Cramming
Hackers and crackers
Salami attack
Risk assessment
25. Remote Access Dial-in User Service
Password audit
Layer 7 - Application
Granularity
RADIUS
26. It is difficult to prosecute a computer criminal if _________ are not deployed
IDEA algorithm
Intentions of the perpetrator
Warning banners
Accountability
27. Public keys are used for encrypting messages and private keys are used for __________messages.
Social Engineering
Depcrypting
CHAP
Users can gain access to any resource upon request (assuming they have proper permissions)
28. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?
Ethernet
Man In The Middle
Sniffer
ISO
29. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
Directive
Confidentiality
Assignment
Stateful Inspection
30. Main goals of an information security program
Host based - network based
Cramming
Confidentiality - Availability -Integrity of data
Mobile
31. There are 65536 _________
Steps in handling incidents
Available service ports
NFS
Fixed length
32. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
Environmental
Steps in handling incidents
Passfilt.dll
SET
33. IKE - Internet Key Exchange is often used in conjunction with what security standard?
NFS
IPSEC
Intrusion Detection System
Password audit
34. Cable modems are ___________than DSL connections
Wild
Risk Equation
Main goal of a risk management program
Less secure
35. A formula used in Quantitative risk analysis
Ethernet
Mobile
SLE - Single Loss Expectancy
ISO
36. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
X.509
Wild
Data Hiding
NFS
37. ___________________ is responsible for creating security policies and for communicating those policies to system users.
Email
All
ISO
Confidentiality - Availability -Integrity of data
38. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?
Configuration Control
Macro
Not rigid
Information
39. What is the main difference between computer abuse and computer crime?
Intentions of the perpetrator
PGP
CRACK
NT Audit events
40. Digital Certificates use which protocol?
Risk Equation
Ethernet
X.509
IDEA algorithm
41. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Less secure
Warning banners
ISO
Warning Banner
42. ______________ relates to the concept of protecting data from unauthorized users.
All
Confidentiality
IPSEC
Acceptance - Transfer - Mitigate
43. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas
Hackers and crackers
Quantitative analysis
Symmetric algorithm
CHAP
44. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
DSS - Digital Signature Standard
Passfilt.dll
Information Security policies
MAC - Mandatory Access Control
45. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
Less secure
Social Engineering
A PGP Signed message
CHAP
46. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
Phreaks
SET
SYN Flooding
Payload
47. Accounting - Authentication - and ____________ are the AAAs of information security.
Cryptanalysis
modems
Authorization
Granularity
48. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
Cisco
Cryptanalysis
Cramming
Salami attack
49. Committing computer crimes in such small doses that they almost go unnoticed.
Business enabler
IANA
Salami attack
a good password policy
50. The ability to adjust access control to the exact amount of permission necessary is called ______________.
Granularity
Mobile
RADIUS
128
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests