SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
Directive
Steps in handling incidents
To make user certificates available to others
Polymorphic
2. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.
Hoaxes
Less secure
Cryptanalysis
MAC - Mandatory Access Control
3. Identifying specific attempts to penetrate systems is the function of the _______________.
Intrusion Detection System
Warning Banner
Sniffer
SLE - Single Loss Expectancy
4. IKE - Internet Key Exchange is often used in conjunction with what security standard?
Warning banners
Gathering digital evidence
Log files
IPSEC
5. It is difficult to prosecute a computer criminal if _________ are not deployed
Granularity
Separation of Duties
Stateful Inspection
Warning banners
6. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Not rigid
CERT - SANS - CERIAS - COAST
Logic bombs
Warning Banner
7. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Risk Equation
0-1023
Data Hiding
Stealth viruses
8. Contain - Recover - Review - Identify - Prepare
Steps in handling incidents
Biometrics
Not very difficult to break.
CERT - SANS - CERIAS - COAST
9. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Test virus
Data Classification
SYN Flooding
Payload
10. ______________ is a major component of an overall risk management program.
Preserve electronic evidence and protect it from any alteration
Payload
Virus definition downloads and system virus scans
Risk assessment
11. A formula used in Quantitative risk analysis
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
SLE - Single Loss Expectancy
Sued for privacy violations
Confidentiality
12. MD5 is a ___________ algorithm
Wild
One way hash
Risk Equation
DAC - Discretionary Access Control
13. A one way hash converts a string of random length into a _______________ encrypted string.
Risk Equation
Fixed length
Accountability
Assignment
14. There are 65536 _________
MAC - Mandatory Access Control
TIGER
Prevent - Recover - Detect
Available service ports
15. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
Password audit
Hackers and crackers
Authentication
Reboot or system startup
16. A boot sector virus goes to work when what event takes place?
Risk assessment
128
Reboot or system startup
SYN Flooding
17. A standardized list of the most common security weaknesses and exploits is the __________.
Virus definition downloads and system virus scans
SLE - Single Loss Expectancy
CVE - Common Vulnerabilities and Exposures
Prevent - Recover - Detect
18. Accounting - Authentication - and ____________ are the AAAs of information security.
0-1023
DSS - Digital Signature Standard
Authorization
SYN Flooding
19. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
DSS - Digital Signature Standard
Gathering digital evidence
Not rigid
RADIUS
20. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Mobile
Passfilt.dll
Macro
Not very difficult to break.
21. Layer 4 of the OSI model corresponds to which layer of the DoD model?
CHAP
Layer 3 - Host to Host
Prevent - Recover - Detect
Presentation Layer - L6
22. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Decentralized access control
Email
Hackers and crackers
Verisign - Microsoft - Dell
23. __________ is the most famous Unix password cracking tool.
Man In The Middle
Fixed length
CRACK
Quantitative analysis
24. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
modems
Unix / Linux based security tools?
product development life cycle
Multi-partite viruses
25. Which of the following is NOT and encryption algorithm?
SSL
Authorization
NFS
Logic bombs
26. ____________ is a file system that was poorly designed and has numerous security flaws.
Verisign - Microsoft - Dell
NFS
CVE - Common Vulnerabilities and Exposures
Unix / Linux based security tools?
27. Which layer of the OSI model handles encryption?
Authorization
TIGER
Presentation Layer - L6
A PGP Signed message
28. The most secure method for storing backup tapes is?
Directive
Mobile
Stealth viruses
Off site in a climate controlled area
29. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Email
Macro
Presentation Layer - L6
Logic bombs
30. A true network security audit does include an audit for _____________
product development life cycle
modems
Symmetric algorithm
Virus definition downloads and system virus scans
31. Vulnerability x Threat = RISK is an example of the _______________.
Risk Equation
Hoaxes
IDEA algorithm
Accountability
32. DES - Data Encryption standard has a 128 bit key and is ________
Quantitative analysis
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Not very difficult to break.
Payload
33. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
X.509
DSS - Digital Signature Standard
SET
Confidentiality - Availability -Integrity of data
34. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Email
CHAP
Gathering digital evidence
Symmetric algorithm
35. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______
Granularity
Cryptanalysis
Passfilt.dll
Data Hiding
36. Combine both boot and file virus behavior
RADIUS
0-1023
SYN Flooding
Multi-partite viruses
37. The ability to adjust access control to the exact amount of permission necessary is called ______________.
Granularity
Data Classification
Also
IPSEC
38. The __________ is the most dangerous part of a virus program.
Residual risk
Payload
Hoaxes
IANA
39. Committing computer crimes in such small doses that they almost go unnoticed.
a good password policy
Protection of data from unauthorized users
Salami attack
NT Audit events
40. An attempt to break an encryption algorithm is called _____________.
Warning banners
Cryptanalysis
Steps in handling incidents
To make user certificates available to others
41. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
Acceptance - Transfer - Mitigate
Cisco
CVE - Common Vulnerabilities and Exposures
Authorization
42. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
CHAP
Residual risk
Cryptanalysis
Phreaks
43. Macintosh computers are _____ at risk for receiving viruses.
Unix / Linux based security tools?
Host based - network based
RADIUS
Also
44. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
Information Security policies
Multi-partite viruses
RADIUS
Protection of data from unauthorized users
45. Countermeasures address security concerns in this category
RADIUS
Information
Steps in handling incidents
CHAP
46. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.
Layer 7 - Application
Buffer Overflow
DAC - Discretionary Access Control
Depcrypting
47. S/MIME was developed for the protection of what communication mechanism(s)?
Data Hiding
Passive network attack
Less secure
Email
48. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Layer 7 - Application
Email
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Users can gain access to any resource upon request (assuming they have proper permissions)
49. Ways to deal with risk.
Acceptance - Transfer - Mitigate
Passive network attack
SSL
Stealth viruses
50. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
Polymorphic
Ethernet
Cramming
Warning Banner
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests