SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Data being delivered from the source to the intended receiver without being altered
0-1023
NFS
Protection of data from unauthorized users
Detective
2. Which layer of the OSI model handles encryption?
S/Key - OPIE
Presentation Layer - L6
involves only computer to computer transactions
Intentions of the perpetrator
3. Ways to deal with risk.
Acceptance - Transfer - Mitigate
Stateful Inspection
Prevent - Recover - Detect
involves only computer to computer transactions
4. Remote Access Dial-in User Service
RADIUS
Protection of data from unauthorized users
a good password policy
Ethernet
5. These should be done on a weekly basis
Intrusion Detection System
Layer 3 - Host to Host
Virus definition downloads and system virus scans
Gathering digital evidence
6. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
Not rigid
Reboot or system startup
Risk Equation
Payload
7. ______________ is a major component of an overall risk management program.
Warning banners
Risk assessment
Confidentiality - Availability -Integrity of data
Stealth viruses
8. Although they are accused of being one in the same - _______________ are two distinctly different groups with different goals pertaining to computers.
Hackers and crackers
128
run applications as generic accounts with little or no privileges.
Warning banners
9. A formula used in Quantitative risk analysis
Layer 7 - Application
SLE - Single Loss Expectancy
Available service ports
Prevent - Recover - Detect
10. S/MIME was developed for the protection of what communication mechanism(s)?
Presentation Layer - L6
Confidentiality
Email
Payload
11. Companies can now be __________ just as easily as they can be sued for security compromises.
Stealth viruses
0-1023
Sued for privacy violations
Information
12. Countermeasures' main objectives
Polymorphic
Prevent - Recover - Detect
Stealth viruses
Directive
13. Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?
Layer 3 - Host to Host
Configuration Control
To make user certificates available to others
Man In The Middle
14. The ability to adjust access control to the exact amount of permission necessary is called ______________.
Granularity
Assignment
PGP
Polymorphic
15. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Biometrics
Less secure
SLE - Single Loss Expectancy
Social Engineering
16. Macintosh computers are _____ at risk for receiving viruses.
Intrusion Detection System
Residual risk
Also
Fixed length
17. Today - ______________ are almost as serious as security violations
Information
Privacy violations
CRACK
0-1023
18. Trend Analysis involves analyzing historical ___________ files in order to look for patterns of abuse or misuse.
Log files
NT Audit events
run applications as generic accounts with little or no privileges.
IDEA algorithm
19. There are 65536 _________
Personal Firewall - IDS - host based - Antivirus
Salami attack
Available service ports
Layer 3 - Host to Host
20. _________________should be Written down - Clearly Communicated to all system users - Audited and revised periodically.
Information Security policies
Wild
Available service ports
Ethernet
21. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Sniffer
Data Hiding
Reboot or system startup
TIGER
22. A type of virus that resides in a Word or Excel document is called a ___________ virus?
Macro
Depcrypting
Warning Banner
Intentions of the perpetrator
23. Passwords: should be audited on a regular basis- should contain some form of your name or userid - should never be shared or written down
a good password policy
Protection of data from unauthorized users
Passive network attack
Test virus
24. A standardized list of the most common security weaknesses and exploits is the __________.
Personal Firewall - IDS - host based - Antivirus
CVE - Common Vulnerabilities and Exposures
Stateful Inspection
Password audit
25. ___________________ viruses change the code order of the strain each time they replicate to another machine.
SLE - Single Loss Expectancy
Polymorphic
C2
Intrusion Detection System
26. The ability to identify and audit a user and his / her actions is known as ____________.
Passfilt.dll
Data Hiding
Users can gain access to any resource upon request (assuming they have proper permissions)
Accountability
27. ________ is the authoritative entity which lists port assignments
Less secure
IANA
0-1023
Decentralized access control
28. Identifying specific attempts to penetrate systems is the function of the _______________.
Intrusion Detection System
Macro
Man In The Middle
Separation of Duties
29. Tiger - TCP Wrappers - TripWire - LogCheck - SATAN
Biometrics
Unix / Linux based security tools?
Man In The Middle
Stateful Inspection
30. There are 5 classes of IP addresses available - but only 3 classes are in common use today
All
Information Security policies
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
MAC - Mandatory Access Control
31. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Layer 3 - Host to Host
Accountability
Warning Banner
Authorization
32. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
Cramming
Sued for privacy violations
NFS
Personal Firewall - IDS - host based - Antivirus
33. It is difficult to prosecute a computer criminal if _________ are not deployed
Information
Warning banners
Layer 7 - Application
Logic bombs
34. The __________ is the most dangerous part of a virus program.
Personal Firewall - IDS - host based - Antivirus
Sniffer
Payload
Presentation Layer - L6
35. Which form of media is handled at the Physical Layer (Layer 1) of the OSI Reference Model?
Ethernet
Fixed length
Hoaxes
IDEA algorithm
36. A ______________ is an electronically generated record that ties a user's ID to their public key.
Passfilt.dll
Business enabler
Certificate
Separation of Duties
37. In a Public Key Infrastructure (PKI) - what is the role of a directory server?
Certificate
MAC - Mandatory Access Control
To make user certificates available to others
Layer 7 - Application
38. _________ is a form of Denial of Service attack which interrupts the TCP three way handshake and leaves half open connections.
C2
Assignment
SYN Flooding
Intrusion Detection System
39. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
IDEA algorithm
Stealth viruses
Authentication
Also
40. So far - no one has been able to crack the ____________ with Brute Force.
Information
NFS
Personal Firewall - IDS - host based - Antivirus
IDEA algorithm
41. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
TIGER
Password audit
CVE - Common Vulnerabilities and Exposures
42. Which organization(s) are responsible for the timely distribution of information security intelligence data?
Steps in handling incidents
Presentation Layer - L6
Warning Banner
CERT - SANS - CERIAS - COAST
43. The act of intercepting the first message in a public key exchange and substituting a bogus key for the original key is an example of which style of attack?
Man In The Middle
ISO
Gathering digital evidence
Intrusion Detection System
44. Wiretapping is an example of a ________.
Information Security policies
SLE - Single Loss Expectancy
Passive network attack
SSL
45. ____ members of the staff need to be educated in disaster recovery procedures.
All
Passwords
X.509
involves only computer to computer transactions
46. HTTP - FTP - SMTP reside at which layer of the OSI model?
All
a good password policy
Directive
Layer 7 - Application
47. To help managers find the correct cost balance between risks and countermeasures
Password audit
Information
Warning Banner
Main goal of a risk management program
48. ___________________ is responsible for creating security policies and for communicating those policies to system users.
Authentication
Symmetric algorithm
ISO
Preserve electronic evidence and protect it from any alteration
49. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.
Macro
Mobile
Data Classification
IPSEC
50. A one way hash converts a string of random length into a _______________ encrypted string.
Risk Equation
Reboot or system startup
modems
Fixed length
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests