Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. So far - no one has been able to crack the ____________ with Brute Force.






2. Public keys are used for encrypting messages and private keys are used for __________messages.






3. What is the main difference between computer abuse and computer crime?






4. S/MIME was developed for the protection of what communication mechanism(s)?






5. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition






6. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?






7. The IDEA algorithm (used in PGP) is _______ bits long.






8. Organizations that can be a valid Certificate Authority (CA)






9. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?






10. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.






11. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?






12. IKE - Internet Key Exchange is often used in conjunction with what security standard?






13. PGP & PEM are programs that allow users to send encrypted messages to each other. What form of encryption do these programs use?






14. Types of firewalls: Packet Filtering - Application Proxy - and _________________.






15. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN






16. Identifying specific attempts to penetrate systems is the function of the _______________.






17. Stealth viruses live in memory while __________ are written to disk






18. These should be done on a weekly basis






19. To help managers find the correct cost balance between risks and countermeasures






20. Logon and Logoff - Use of User Rights - Security Policy Change






21. There are 65536 _________






22. Combine both boot and file virus behavior






23. ____________ is a file system that was poorly designed and has numerous security flaws.






24. One method that can reduce exposure to malicious code is to ___________________






25. Layer 4 of the OSI model corresponds to which layer of the DoD model?






26. _______________ supply AV engines with false information to avoid detection






27. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy






28. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.






29. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.






30. A one way hash converts a string of random length into a _______________ encrypted string.






31. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.






32. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.






33. A Security Reference Monitor relates to which DoD security standard?






34. The __________ is the most dangerous part of a virus program.






35. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?






36. Vulnerability x Threat = RISK is an example of the _______________.






37. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.






38. ______________ is a Unix security scanning tool developed at Texas A&M university.






39. ___________________ is responsible for creating security policies and for communicating those policies to system users.






40. Allows File owners to determine access rights.






41. An intrusion detection system is an example of what type of countermeasure?






42. Ways to deal with risk.






43. Digital Certificates use which protocol?






44. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.






45. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.






46. Main goals of an information security program






47. ______________ relates to the concept of protecting data from unauthorized users.






48. MD5 is a ___________ algorithm






49. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






50. ______________ is a major component of an overall risk management program.