Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. __________ is a tool used by network administrators to capture packets from a network.






2. Vulnerability x Threat = RISK is an example of the _______________.






3. A ______________ is an electronically generated record that ties a user's ID to their public key.






4. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?






5. Data being delivered from the source to the intended receiver without being altered






6. Organizations that can be a valid Certificate Authority (CA)






7. ______________ is a major component of an overall risk management program.






8. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down






9. The ability to adjust access control to the exact amount of permission necessary is called ______________.






10. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






11. One method that can reduce exposure to malicious code is to ___________________






12. Allows File owners to determine access rights.






13. Layer 4 of the OSI model corresponds to which layer of the DoD model?






14. An intrusion detection system is an example of what type of countermeasure?






15. RSA is not based on a ________






16. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?






17. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.






18. These should be done on a weekly basis






19. The ultimate goal of a computer forensics specialist is to ___________________.






20. Contain - Recover - Review - Identify - Prepare






21. Stealth viruses live in memory while __________ are written to disk






22. S/MIME was developed for the protection of what communication mechanism(s)?






23. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.






24. ___________________ viruses change the code order of the strain each time they replicate to another machine.






25. __________ is the most famous Unix password cracking tool.






26. A true network security audit does include an audit for _____________






27. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.






28. Types of firewalls: Packet Filtering - Application Proxy - and _________________.






29. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?






30. Information security policies are a ___________________.






31. Countermeasures address security concerns in this category






32. ________ is the authoritative entity which lists port assignments






33. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______






34. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.






35. Smart cards are a secure alternative to which weak security mechanism?






36. What security principle is based on the division of job responsibilities - designed to prevent fraud?






37. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?






38. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN






39. Cable modems are ___________than DSL connections






40. Public keys are used for encrypting messages and private keys are used for __________messages.






41. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.






42. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.






43. They specifically target telephone networks






44. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.






45. The __________ is the most dangerous part of a virus program.






46. Digital Certificates use which protocol?






47. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.






48. Combine both boot and file virus behavior






49. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition






50. In a Public Key Infrastructure (PKI) - what is the role of a directory server?