Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Companies can now be __________ just as easily as they can be sued for security compromises.






2. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?






3. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas






4. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.






5. Organizations that can be a valid Certificate Authority (CA)






6. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?






7. Information security policies are a ___________________.






8. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?






9. Which of the following is NOT and encryption algorithm?






10. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.






11. Committing computer crimes in such small doses that they almost go unnoticed.






12. One method that can reduce exposure to malicious code is to ___________________






13. A formula used in Quantitative risk analysis






14. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






15. Stealth viruses live in memory while __________ are written to disk






16. Digital Certificates use which protocol?






17. These should be done on a weekly basis






18. RSA is not based on a ________






19. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.






20. ___________________ viruses change the code order of the strain each time they replicate to another machine.






21. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?






22. __________ is the most famous Unix password cracking tool.






23. This free (for personal use) program is used to encrypt and decrypt emails.






24. Main goals of an information security program






25. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.






26. An attempt to break an encryption algorithm is called _____________.






27. They specifically target telephone networks






28. The ability to identify and audit a user and his / her actions is known as ____________.






29. Macintosh computers are _____ at risk for receiving viruses.






30. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.






31. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition






32. There are 5 classes of IP addresses available - but only 3 classes are in common use today






33. Wiretapping is an example of a ________.






34. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______






35. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.






36. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.






37. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis






38. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.






39. To help managers find the correct cost balance between risks and countermeasures






40. A Security Reference Monitor relates to which DoD security standard?






41. Vulnerability x Threat = RISK is an example of the _______________.






42. Cable modems are ___________than DSL connections






43. The ability to adjust access control to the exact amount of permission necessary is called ______________.






44. Today - ______________ are almost as serious as security violations






45. Countermeasures' main objectives






46. Which layer of the OSI model handles encryption?






47. Smart cards are a secure alternative to which weak security mechanism?






48. Which of the concepts best describes Availability in relation to computer resources?






49. HTTP - FTP - SMTP reside at which layer of the OSI model?






50. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.