Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.






2. Countermeasures' main objectives






3. Organizations that can be a valid Certificate Authority (CA)






4. Combine both boot and file virus behavior






5. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.






6. A ______________ is an electronically generated record that ties a user's ID to their public key.






7. These should be done on a weekly basis






8. ____ members of the staff need to be educated in disaster recovery procedures.






9. Stealth viruses live in memory while __________ are written to disk






10. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?






11. So far - no one has been able to crack the ____________ with Brute Force.






12. __________ is a tool used by network administrators to capture packets from a network.






13. Wiretapping is an example of a ________.






14. What security principle is based on the division of job responsibilities - designed to prevent fraud?






15. __________ is the most famous Unix password cracking tool.






16. A formula used in Quantitative risk analysis






17. Remote Access Dial-in User Service






18. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition






19. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.






20. A Security Reference Monitor relates to which DoD security standard?






21. A one way hash converts a string of random length into a _______________ encrypted string.






22. Which range defines 'well known ports?'






23. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.






24. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.






25. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.






26. Which of the following is NOT and encryption algorithm?






27. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?






28. MD5 is a ___________ algorithm






29. Which of the concepts best describes Availability in relation to computer resources?






30. Contain - Recover - Review - Identify - Prepare






31. Layer 4 of the OSI model corresponds to which layer of the DoD model?






32. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.






33. It is difficult to prosecute a computer criminal if _________ are not deployed






34. ______________ relates to the concept of protecting data from unauthorized users.






35. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?






36. S/MIME was developed for the protection of what communication mechanism(s)?






37. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?






38. What is the main difference between computer abuse and computer crime?






39. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?






40. Companies can now be __________ just as easily as they can be sued for security compromises.






41. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.






42. ________ is the authoritative entity which lists port assignments






43. To help managers find the correct cost balance between risks and countermeasures






44. Logon and Logoff - Use of User Rights - Security Policy Change






45. Countermeasures address security concerns in this category






46. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?






47. Ways to deal with risk.






48. The most secure method for storing backup tapes is?






49. Digital Certificates use which protocol?






50. Macintosh computers are _____ at risk for receiving viruses.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests