SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
Buffer Overflow
To make user certificates available to others
MAC - Mandatory Access Control
Verisign - Microsoft - Dell
2. Contain - Recover - Review - Identify - Prepare
Steps in handling incidents
Layer 7 - Application
SYN Flooding
Not very difficult to break.
3. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
Password audit
Acceptance - Transfer - Mitigate
product development life cycle
Data Hiding
4. S/MIME was developed for the protection of what communication mechanism(s)?
Available service ports
Social Engineering
Email
Man In The Middle
5. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
Information Security policies
Authorization
Intentions of the perpetrator
modems
6. Allows File owners to determine access rights.
Steps in handling incidents
Gathering digital evidence
Assignment
Decentralized access control
7. __________ is a tool used by network administrators to capture packets from a network.
Personal Firewall - IDS - host based - Antivirus
Sniffer
Residual risk
Detective
8. It is difficult to prosecute a computer criminal if _________ are not deployed
Warning banners
Accountability
Privacy violations
Presentation Layer - L6
9. Information security policies are a ___________________.
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Steps in handling incidents
Protection of data from unauthorized users
Business enabler
10. Examples of One- Time Password technology
S/Key - OPIE
Email
Polymorphic
Personal Firewall - IDS - host based - Antivirus
11. What is the main difference between computer abuse and computer crime?
Biometrics
RSA
Certificate
Intentions of the perpetrator
12. IKE - Internet Key Exchange is often used in conjunction with what security standard?
CVE - Common Vulnerabilities and Exposures
Stateful Inspection
S/Key - OPIE
IPSEC
13. Countermeasures address security concerns in this category
Information
0-1023
Verisign - Microsoft - Dell
Hoaxes
14. A ______________ is an electronically generated record that ties a user's ID to their public key.
Certificate
Test virus
Polymorphic
Information
15. ______________ is a major component of an overall risk management program.
128
Risk assessment
RADIUS
Phreaks
16. A one way hash converts a string of random length into a _______________ encrypted string.
Depcrypting
a good password policy
Fixed length
Warning Banner
17. A standardized list of the most common security weaknesses and exploits is the __________.
Information Security policies
Cryptanalysis
Separation of Duties
CVE - Common Vulnerabilities and Exposures
18. The most secure method for storing backup tapes is?
Accountability
Presentation Layer - L6
Off site in a climate controlled area
Personal Firewall - IDS - host based - Antivirus
19. Layer 4 of the OSI model corresponds to which layer of the DoD model?
0-1023
Macro
Layer 3 - Host to Host
Available service ports
20. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
run applications as generic accounts with little or no privileges.
Authentication
Business enabler
C2
21. Public keys are used for encrypting messages and private keys are used for __________messages.
S/Key - OPIE
Depcrypting
Decentralized access control
Sued for privacy violations
22. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Stealth viruses
Hackers and crackers
Data Classification
SET
23. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
PGP
Unix / Linux based security tools?
Sniffer
Stealth viruses
24. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Polymorphic
Prevent - Recover - Detect
Separation of Duties
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
25. Stealth viruses live in memory while __________ are written to disk
Logic bombs
SET
SLE - Single Loss Expectancy
Warning banners
26. An intrusion detection system is an example of what type of countermeasure?
128
Hoaxes
Detective
Protection of data from unauthorized users
27. Name two types of Intrusion Detection Systems
Host based - network based
To make user certificates available to others
Environmental
SLE - Single Loss Expectancy
28. ____ members of the staff need to be educated in disaster recovery procedures.
Phreaks
All
Reboot or system startup
Multi-partite viruses
29. The ability to identify and audit a user and his / her actions is known as ____________.
RADIUS
Privacy violations
One way hash
Accountability
30. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Off site in a climate controlled area
Information
Residual risk
S/Key - OPIE
31. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
Presentation Layer - L6
Risk Equation
Passfilt.dll
CHAP
32. Logon and Logoff - Use of User Rights - Security Policy Change
NT Audit events
Ethernet
SYN Flooding
Not rigid
33. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Biometrics
NFS
CVE - Common Vulnerabilities and Exposures
SLE - Single Loss Expectancy
34. Remote Access Dial-in User Service
S/Key - OPIE
RADIUS
Also
Information Security policies
35. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?
IANA
Configuration Control
Layer 3 - Host to Host
CERT - SANS - CERIAS - COAST
36. Which of the concepts best describes Availability in relation to computer resources?
Test virus
Passfilt.dll
Users can gain access to any resource upon request (assuming they have proper permissions)
Directive
37. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
Personal Firewall - IDS - host based - Antivirus
CHAP
Steps in handling incidents
DSS - Digital Signature Standard
38. ______________ is a Unix security scanning tool developed at Texas A&M university.
Acceptance - Transfer - Mitigate
Protection of data from unauthorized users
TIGER
Verisign - Microsoft - Dell
39. A formula used in Quantitative risk analysis
SLE - Single Loss Expectancy
Users can gain access to any resource upon request (assuming they have proper permissions)
Warning Banner
Intrusion Detection System
40. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
SET
product development life cycle
Environmental
CRACK
41. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
To make user certificates available to others
Mobile
All
Man In The Middle
42. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
MAC - Mandatory Access Control
IDEA algorithm
Presentation Layer - L6
Configuration Control
43. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Layer 7 - Application
Main goal of a risk management program
Gathering digital evidence
Polymorphic
44. Which organization(s) are responsible for the timely distribution of information security intelligence data?
CERT - SANS - CERIAS - COAST
Wild
Polymorphic
IANA
45. __________ attacks capitalize on programming errors and can allow the originator to gain additional privileges on a machine.
Authentication
Verisign - Microsoft - Dell
NT Audit events
Buffer Overflow
46. Digital Certificates use which protocol?
Cramming
Virus definition downloads and system virus scans
X.509
CVE - Common Vulnerabilities and Exposures
47. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
Not very difficult to break.
SYN Flooding
involves only computer to computer transactions
IANA
48. Cable modems are ___________than DSL connections
Fixed length
Buffer Overflow
Less secure
Layer 7 - Application
49. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
TIGER
Cisco
CVE - Common Vulnerabilities and Exposures
Acceptance - Transfer - Mitigate
50. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Stateful Inspection
a good password policy
Available service ports
run applications as generic accounts with little or no privileges.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests