Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ______________ relates to the concept of protecting data from unauthorized users.






2. Public keys are used for encrypting messages and private keys are used for __________messages.






3. These should be done on a weekly basis






4. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.






5. A boot sector virus goes to work when what event takes place?






6. A standardized list of the most common security weaknesses and exploits is the __________.






7. _______________ supply AV engines with false information to avoid detection






8. A virus is considered to be 'in the ______ ' if it has been reported as replicating and causing harm to computers.






9. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.






10. There are 5 classes of IP addresses available - but only 3 classes are in common use today






11. One method that can reduce exposure to malicious code is to ___________________






12. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.






13. Which of the concepts best describes Availability in relation to computer resources?






14. Allows File owners to determine access rights.






15. It is difficult to prosecute a computer criminal if _________ are not deployed






16. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.






17. ____________ is used in mission critical systems and applications to lock down information based on sensitivity levels (Confidential - Top Secret - etc.






18. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?






19. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy






20. In a Public Key Infrastructure (PKI) - what is the role of a directory server?






21. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas






22. Code Review - Certification - Accreditation - Functional Design Review - System Test Review






23. ______________ is a Unix security scanning tool developed at Texas A&M university.






24. A ______________ is an electronically generated record that ties a user's ID to their public key.






25. Examples of One- Time Password technology






26. ________ is the authoritative entity which lists port assignments






27. This free (for personal use) program is used to encrypt and decrypt emails.






28. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?






29. A one way hash converts a string of random length into a _______________ encrypted string.






30. Which range defines 'well known ports?'






31. Companies can now be __________ just as easily as they can be sued for security compromises.






32. The ability to identify and audit a user and his / her actions is known as ____________.






33. Wiretapping is an example of a ________.






34. A formula used in Quantitative risk analysis






35. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.






36. Accounting - Authentication - and ____________ are the AAAs of information security.






37. Macintosh computers are _____ at risk for receiving viruses.






38. Which layer of the OSI model handles encryption?






39. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN






40. Name two types of Intrusion Detection Systems






41. HTTP - FTP - SMTP reside at which layer of the OSI model?






42. Ways to deal with risk.






43. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?






44. Which organization(s) are responsible for the timely distribution of information security intelligence data?






45. A type of virus that resides in a Word or Excel document is called a ___________ virus?






46. IKE - Internet Key Exchange is often used in conjunction with what security standard?






47. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?






48. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?






49. Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition






50. An intrusion detection system is an example of what type of countermeasure?