Test your basic knowledge |

SSCP: Systems Security Certified Practitioner

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In a Public Key Infrastructure (PKI) - what is the role of a directory server?






2. Unlike like viruses and worm - __________ are bogus messages that spread via email forwarding.






3. Identifying specific attempts to penetrate systems is the function of the _______________.






4. IKE - Internet Key Exchange is often used in conjunction with what security standard?






5. It is difficult to prosecute a computer criminal if _________ are not deployed






6. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy






7. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.






8. Contain - Recover - Review - Identify - Prepare






9. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.






10. ______________ is a major component of an overall risk management program.






11. A formula used in Quantitative risk analysis






12. MD5 is a ___________ algorithm






13. A one way hash converts a string of random length into a _______________ encrypted string.






14. There are 65536 _________






15. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?






16. A boot sector virus goes to work when what event takes place?






17. A standardized list of the most common security weaknesses and exploits is the __________.






18. Accounting - Authentication - and ____________ are the AAAs of information security.






19. Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?






20. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.






21. Layer 4 of the OSI model corresponds to which layer of the DoD model?






22. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.






23. __________ is the most famous Unix password cracking tool.






24. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN






25. Which of the following is NOT and encryption algorithm?






26. ____________ is a file system that was poorly designed and has numerous security flaws.






27. Which layer of the OSI model handles encryption?






28. The most secure method for storing backup tapes is?






29. A type of virus that resides in a Word or Excel document is called a ___________ virus?






30. A true network security audit does include an audit for _____________






31. Vulnerability x Threat = RISK is an example of the _______________.






32. DES - Data Encryption standard has a 128 bit key and is ________






33. ________ is a protocol developed by Visa and MasterCard to protect electronic transactions.






34. When ________________it is very important to do document the chain of evidence by taking good notes and perform a bit-level back up of the data before analysis






35. Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______






36. Combine both boot and file virus behavior






37. The ability to adjust access control to the exact amount of permission necessary is called ______________.






38. The __________ is the most dangerous part of a virus program.






39. Committing computer crimes in such small doses that they almost go unnoticed.






40. An attempt to break an encryption algorithm is called _____________.






41. Which major vendor adopted TACACS into its product line as a form of AAA architecture?






42. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?






43. Macintosh computers are _____ at risk for receiving viruses.






44. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.






45. Countermeasures address security concerns in this category






46. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.






47. S/MIME was developed for the protection of what communication mechanism(s)?






48. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?






49. Ways to deal with risk.






50. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests