SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______
Warning banners
Off site in a climate controlled area
Macro
Passfilt.dll
2. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
involves only computer to computer transactions
Intrusion Detection System
SSL
Biometrics
3. It is difficult to prosecute a computer criminal if _________ are not deployed
Depcrypting
Hoaxes
Warning banners
modems
4. An intrusion detection system is an example of what type of countermeasure?
Detective
PGP
run applications as generic accounts with little or no privileges.
Passwords
5. Countermeasures address security concerns in this category
IANA
Off site in a climate controlled area
Reboot or system startup
Information
6. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
Mobile
SET
Business enabler
Virus definition downloads and system virus scans
7. MD5 is a ___________ algorithm
Salami attack
One way hash
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Warning banners
8. Allows File owners to determine access rights.
Decentralized access control
Personal Firewall - IDS - host based - Antivirus
TIGER
Residual risk
9. A Security Reference Monitor relates to which DoD security standard?
Multi-partite viruses
C2
Off site in a climate controlled area
Granularity
10. Cable modems are ___________than DSL connections
Less secure
To make user certificates available to others
PGP
Fixed length
11. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down
Biometrics
Sniffer
PGP
a good password policy
12. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
SYN Flooding
Multi-partite viruses
Steps in handling incidents
Sniffer
13. DES - Data Encryption standard has a 128 bit key and is ________
IDEA algorithm
Not very difficult to break.
Payload
To make user certificates available to others
14. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
To make user certificates available to others
S/Key - OPIE
Stealth viruses
Biometrics
15. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas
CRACK
Intentions of the perpetrator
Configuration Control
Quantitative analysis
16. Information security policies are a ___________________.
Stealth viruses
C2
Business enabler
Password audit
17. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Log files
CRACK
SYN Flooding
Reboot or system startup
18. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Payload
Warning banners
IPSEC
Data Hiding
19. The ultimate goal of a computer forensics specialist is to ___________________.
IPSEC
Preserve electronic evidence and protect it from any alteration
Steps in handling incidents
Not very difficult to break.
20. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Biometrics
TIGER
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Assignment
21. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Polymorphic
Biometrics
Multi-partite viruses
Gathering digital evidence
22. Contain - Recover - Review - Identify - Prepare
Steps in handling incidents
Payload
Fixed length
Configuration Control
23. Committing computer crimes in such small doses that they almost go unnoticed.
Salami attack
Quantitative analysis
RADIUS
Authentication
24. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.
DAC - Discretionary Access Control
a good password policy
S/Key - OPIE
Granularity
25. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Stealth viruses
Residual risk
IDEA algorithm
Polymorphic
26. Smart cards are a secure alternative to which weak security mechanism?
Wild
Man In The Middle
Passwords
Authorization
27. A formula used in Quantitative risk analysis
SLE - Single Loss Expectancy
Not rigid
modems
Accountability
28. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
Intrusion Detection System
Stealth viruses
Risk Equation
Unix / Linux based security tools?
29. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.
Data Classification
Environmental
Salami attack
Virus definition downloads and system virus scans
30. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Data Hiding
MAC - Mandatory Access Control
Social Engineering
Man In The Middle
31. What security principle is based on the division of job responsibilities - designed to prevent fraud?
DAC - Discretionary Access Control
Preserve electronic evidence and protect it from any alteration
Environmental
Separation of Duties
32. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Buffer Overflow
Preserve electronic evidence and protect it from any alteration
128
Protection of data from unauthorized users
33. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
Information
Available service ports
Cramming
Risk assessment
34. The most secure method for storing backup tapes is?
a good password policy
RSA
Off site in a climate controlled area
PGP
35. ____ members of the staff need to be educated in disaster recovery procedures.
All
128
Virus definition downloads and system virus scans
Data Classification
36. Data being delivered from the source to the intended receiver without being altered
Protection of data from unauthorized users
product development life cycle
Granularity
All
37. RSA is not based on a ________
Layer 7 - Application
Symmetric algorithm
ISO
Buffer Overflow
38. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
involves only computer to computer transactions
RADIUS
product development life cycle
One way hash
39. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Risk assessment
Passive network attack
Intentions of the perpetrator
40. They specifically target telephone networks
Salami attack
Macro
Phreaks
Passfilt.dll
41. __________ is the most famous Unix password cracking tool.
Not rigid
Mobile
Environmental
CRACK
42. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
IANA
TIGER
All
DSS - Digital Signature Standard
43. The ability to identify and audit a user and his / her actions is known as ____________.
Privacy violations
Confidentiality
DAC - Discretionary Access Control
Accountability
44. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
Authentication
Password audit
IANA
Cryptanalysis
45. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
Salami attack
128
Environmental
Preserve electronic evidence and protect it from any alteration
46. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
CHAP
Authentication
Information Security policies
product development life cycle
47. Which range defines 'well known ports?'
Phreaks
0-1023
128
CRACK
48. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
NFS
Polymorphic
Mobile
49. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.
Symmetric algorithm
SYN Flooding
Hoaxes
C2
50. Name two types of Intrusion Detection Systems
IDEA algorithm
S/Key - OPIE
Steps in handling incidents
Host based - network based