SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Name two types of Intrusion Detection Systems
To make user certificates available to others
Host based - network based
Certificate
Layer 7 - Application
2. A ______________ is an electronically generated record that ties a user's ID to their public key.
Man In The Middle
Host based - network based
Cisco
Certificate
3. HTTP - FTP - SMTP reside at which layer of the OSI model?
Layer 7 - Application
Cisco
Sniffer
Data Hiding
4. Committing computer crimes in such small doses that they almost go unnoticed.
product development life cycle
Salami attack
CVE - Common Vulnerabilities and Exposures
a good password policy
5. Remote Access Dial-in User Service
RADIUS
C2
Ethernet
Mobile
6. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Stateful Inspection
0-1023
Preserve electronic evidence and protect it from any alteration
RADIUS
7. Layer 4 of the OSI model corresponds to which layer of the DoD model?
Biometrics
Layer 3 - Host to Host
X.509
Granularity
8. Countermeasures' main objectives
Intentions of the perpetrator
Prevent - Recover - Detect
Not very difficult to break.
Accountability
9. Main goals of an information security program
Main goal of a risk management program
Confidentiality - Availability -Integrity of data
Hackers and crackers
Virus definition downloads and system virus scans
10. The IDEA algorithm (used in PGP) is _______ bits long.
Hackers and crackers
Residual risk
128
Test virus
11. Countermeasures address security concerns in this category
Data Classification
Information
SLE - Single Loss Expectancy
Depcrypting
12. Logon and Logoff - Use of User Rights - Security Policy Change
SET
Available service ports
NT Audit events
Depcrypting
13. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Data Hiding
Payload
Preserve electronic evidence and protect it from any alteration
Virus definition downloads and system virus scans
14. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
0-1023
DAC - Discretionary Access Control
Intentions of the perpetrator
Directive
15. The most secure method for storing backup tapes is?
Acceptance - Transfer - Mitigate
Separation of Duties
Off site in a climate controlled area
Risk assessment
16. Combine both boot and file virus behavior
0-1023
Acceptance - Transfer - Mitigate
Sued for privacy violations
Multi-partite viruses
17. So far - no one has been able to crack the ____________ with Brute Force.
Intrusion Detection System
IDEA algorithm
Macro
Acceptance - Transfer - Mitigate
18. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Password audit
Gathering digital evidence
Detective
Less secure
19. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
Intentions of the perpetrator
Verisign - Microsoft - Dell
Preserve electronic evidence and protect it from any alteration
Cisco
20. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
SSL
Mobile
Decentralized access control
involves only computer to computer transactions
21. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
C2
Information
X.509
Password audit
22. _______________ supply AV engines with false information to avoid detection
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
NFS
Ethernet
Stealth viruses
23. There are 65536 _________
Available service ports
DAC - Discretionary Access Control
Main goal of a risk management program
Authorization
24. RSA is not based on a ________
Depcrypting
Separation of Duties
Symmetric algorithm
Passive network attack
25. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.
Hoaxes
involves only computer to computer transactions
Email
SSL
26. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Configuration Control
Less secure
Users can gain access to any resource upon request (assuming they have proper permissions)
Biometrics
27. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Certificate
A PGP Signed message
Log files
Personal Firewall - IDS - host based - Antivirus
28. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
Not very difficult to break.
Authentication
To make user certificates available to others
Cramming
29. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
Confidentiality
Payload
Less secure
Assignment
30. S/MIME was developed for the protection of what communication mechanism(s)?
modems
Logic bombs
Virus definition downloads and system virus scans
Email
31. Identifying specific attempts to penetrate systems is the function of the _______________.
run applications as generic accounts with little or no privileges.
CHAP
Privacy violations
Intrusion Detection System
32. To help managers find the correct cost balance between risks and countermeasures
Host based - network based
Log files
Cisco
Main goal of a risk management program
33. Ways to deal with risk.
Acceptance - Transfer - Mitigate
128
Data Classification
Risk Equation
34. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
X.509
Residual risk
Accountability
SET
35. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
Environmental
Salami attack
Warning banners
Passwords
36. One method that can reduce exposure to malicious code is to ___________________
Hoaxes
Warning banners
Intrusion Detection System
run applications as generic accounts with little or no privileges.
37. __________ is a tool used by network administrators to capture packets from a network.
Protection of data from unauthorized users
IPSEC
Sniffer
Information
38. ________ is the authoritative entity which lists port assignments
Macro
Information
IPSEC
IANA
39. A boot sector virus goes to work when what event takes place?
RADIUS
Fixed length
Polymorphic
Reboot or system startup
40. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
Off site in a climate controlled area
Personal Firewall - IDS - host based - Antivirus
Confidentiality - Availability -Integrity of data
Steps in handling incidents
41. Digital Certificates use which protocol?
Directive
All
Sniffer
X.509
42. Information security policies are a ___________________.
Business enabler
Separation of Duties
IPSEC
CERT - SANS - CERIAS - COAST
43. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
Directive
DSS - Digital Signature Standard
Sued for privacy violations
CRACK
44. Which of the following is NOT and encryption algorithm?
Environmental
SSL
Protection of data from unauthorized users
Host based - network based
45. IKE - Internet Key Exchange is often used in conjunction with what security standard?
IPSEC
Not rigid
Ethernet
Log files
46. Stealth viruses live in memory while __________ are written to disk
Warning banners
Layer 7 - Application
Logic bombs
All
47. ____________ is a file system that was poorly designed and has numerous security flaws.
NFS
Less secure
X.509
ISO
48. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
CVE - Common Vulnerabilities and Exposures
A PGP Signed message
Host based - network based
One way hash
49. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
Cisco
product development life cycle
Phreaks
Unix / Linux based security tools?
50. An attempt to break an encryption algorithm is called _____________.
Data Hiding
run applications as generic accounts with little or no privileges.
Users can gain access to any resource upon request (assuming they have proper permissions)
Cryptanalysis
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests