SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Logon and Logoff - Use of User Rights - Security Policy Change
NT Audit events
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Hackers and crackers
run applications as generic accounts with little or no privileges.
2. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
Passwords
0-1023
Authentication
Off site in a climate controlled area
3. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.
MAC - Mandatory Access Control
Reboot or system startup
Granularity
Available service ports
4. The ability to identify and audit a user and his / her actions is known as ____________.
Accountability
Layer 3 - Host to Host
Payload
Less secure
5. __________ is the most famous Unix password cracking tool.
To make user certificates available to others
CRACK
Multi-partite viruses
a good password policy
6. Security incidents fall into a number of categories such as accidental - deliberate - and ____________.
DSS - Digital Signature Standard
Granularity
Environmental
Preserve electronic evidence and protect it from any alteration
7. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
modems
Information
Granularity
Password audit
8. What security principle is based on the division of job responsibilities - designed to prevent fraud?
Separation of Duties
Directive
Configuration Control
DSS - Digital Signature Standard
9. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
product development life cycle
SLE - Single Loss Expectancy
Man In The Middle
Biometrics
10. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis
Email
Protection of data from unauthorized users
Unix / Linux based security tools?
Gathering digital evidence
11. ______________ is a major component of an overall risk management program.
Passfilt.dll
Log files
Data Hiding
Risk assessment
12. To help managers find the correct cost balance between risks and countermeasures
Privacy violations
Mobile
Hoaxes
Main goal of a risk management program
13. Countermeasures' main objectives
Off site in a climate controlled area
Protection of data from unauthorized users
Prevent - Recover - Detect
NT Audit events
14. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.
Environmental
SET
Virus definition downloads and system virus scans
Payload
15. S/MIME was developed for the protection of what communication mechanism(s)?
Email
Risk Equation
Acceptance - Transfer - Mitigate
SYN Flooding
16. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition
Test virus
Sued for privacy violations
Biometrics
DAC - Discretionary Access Control
17. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
SET
Information
To make user certificates available to others
Salami attack
18. ______________ is a Unix security scanning tool developed at Texas A&M university.
Verisign - Microsoft - Dell
CHAP
Depcrypting
TIGER
19. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
CERT - SANS - CERIAS - COAST
X.509
Presentation Layer - L6
Warning Banner
20. A true network security audit does include an audit for _____________
modems
IDEA algorithm
Stealth viruses
Cryptanalysis
21. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Intentions of the perpetrator
Polymorphic
Business enabler
Test virus
22. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
IDEA algorithm
Hoaxes
Password audit
Not rigid
23. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?
RSA
Virus definition downloads and system virus scans
Cramming
SYN Flooding
24. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
Intentions of the perpetrator
Detective
Data Classification
Unix / Linux based security tools?
25. A one way hash converts a string of random length into a _______________ encrypted string.
RADIUS
Fixed length
X.509
Steps in handling incidents
26. Digital Certificates use which protocol?
NT Audit events
X.509
C2
Business enabler
27. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
Hackers and crackers
Configuration Control
Information Security policies
Also
28. Main goals of an information security program
C2
Confidentiality - Availability -Integrity of data
Not rigid
Data Classification
29. Which layer of the OSI model handles encryption?
RADIUS
Presentation Layer - L6
MAC - Mandatory Access Control
S/Key - OPIE
30. Remote Access Dial-in User Service
RADIUS
CVE - Common Vulnerabilities and Exposures
C2
Environmental
31. There are 65536 _________
Fixed length
Ethernet
Reboot or system startup
Available service ports
32. The IDEA algorithm (used in PGP) is _______ bits long.
SYN Flooding
Macro
Passwords
128
33. There are 5 classes of IP addresses available - but only 3 classes are in common use today
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Quantitative analysis
Authentication
NT Audit events
34. Contain - Recover - Review - Identify - Prepare
One way hash
PGP
CHAP
Steps in handling incidents
35. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Test virus
Sniffer
To make user certificates available to others
run applications as generic accounts with little or no privileges.
36. Countermeasures address security concerns in this category
Mobile
Information
0-1023
CRACK
37. The most secure method for storing backup tapes is?
involves only computer to computer transactions
Off site in a climate controlled area
NFS
DAC - Discretionary Access Control
38. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Business enabler
Stateful Inspection
Data Hiding
Less secure
39. A formula used in Quantitative risk analysis
Users can gain access to any resource upon request (assuming they have proper permissions)
SLE - Single Loss Expectancy
Sued for privacy violations
Preserve electronic evidence and protect it from any alteration
40. ____ members of the staff need to be educated in disaster recovery procedures.
All
Configuration Control
Man In The Middle
Directive
41. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Residual risk
Quantitative analysis
Steps in handling incidents
Less secure
42. Public keys are used for encrypting messages and private keys are used for __________messages.
Symmetric algorithm
128
Presentation Layer - L6
Depcrypting
43. So far - no one has been able to crack the ____________ with Brute Force.
Not very difficult to break.
IDEA algorithm
Prevent - Recover - Detect
Certificate
44. There are 6 types of security control practices. ___________ controls are management policies - procedures - and guidelines that usually effect the entire system. These types of controls deal with system auditing and usability.
Ethernet
Directive
Verisign - Microsoft - Dell
Depcrypting
45. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Macro
CRACK
Social Engineering
46. ________ is the authoritative entity which lists port assignments
Man In The Middle
involves only computer to computer transactions
IANA
Available service ports
47. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?
Intentions of the perpetrator
Steps in handling incidents
Residual risk
DSS - Digital Signature Standard
48. Information security policies are a ___________________.
Business enabler
Confidentiality
Separation of Duties
Also
49. An intrusion detection system is an example of what type of countermeasure?
To make user certificates available to others
a good password policy
Detective
Phreaks
50. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.
SLE - Single Loss Expectancy
Passive network attack
Data Classification
Email
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests