SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
SSCP: Systems Security Certified Practitioner
Start Test
Study First
Subjects
:
certifications
,
sscp
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Remote Access Dial-in User Service
Confidentiality
Test virus
Personal Firewall - IDS - host based - Antivirus
RADIUS
2. What is the following paragraph an example of? <<ATTN: This system is for the use of authorized persons only. If you use this system without authority - or if you abuse your authority - then you are subject to having all of your activities on this sy
Warning Banner
All
Symmetric algorithm
Acceptance - Transfer - Mitigate
3. Instructions or code that executes on an end user's machine from a web browser is known as __________ code.
Payload
product development life cycle
Environmental
Mobile
4. These should be done on a weekly basis
Layer 3 - Host to Host
Configuration Control
Virus definition downloads and system virus scans
Detective
5. A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.
Passive network attack
Stateful Inspection
Not rigid
Cisco
6. Types of firewalls: Packet Filtering - Application Proxy - and _________________.
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Man In The Middle
Stateful Inspection
7. ___________________ viruses change the code order of the strain each time they replicate to another machine.
Symmetric algorithm
Polymorphic
RSA
Stealth viruses
8. Combine both boot and file virus behavior
involves only computer to computer transactions
Multi-partite viruses
Less secure
Verisign - Microsoft - Dell
9. Although it is considered a low tech attack ____________ is still a very effective way of gaining unauthorized access to network systems.
Residual risk
Social Engineering
Passwords
Cisco
10. There are 5 classes of IP addresses available - but only 3 classes are in common use today
Stealth viruses
Host based - network based
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
To make user certificates available to others
11. What is the main difference between computer abuse and computer crime?
Residual risk
Business enabler
Intentions of the perpetrator
Passive network attack
12. Countermeasures' main objectives
Prevent - Recover - Detect
Social Engineering
Privacy violations
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
13. ___________ - generally considered 'need to know' access is given based on permissions granted to the user.
Symmetric algorithm
DAC - Discretionary Access Control
Prevent - Recover - Detect
Depcrypting
14. Unclassified - Private - Confidential - Secret - Top Secret - and Internal Use Only are levels of ________________.
Layer 3 - Host to Host
Not very difficult to break.
Passwords
Data Classification
15. Code Review - Certification - Accreditation - Functional Design Review - System Test Review
product development life cycle
DSS - Digital Signature Standard
Decentralized access control
Also
16. Layer 4 in the DoD model overlaps with which layer(s) of the OSI model?
Directive
Layer 7 - Application
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Users can gain access to any resource upon request (assuming they have proper permissions)
17. Wiretapping is an example of a ________.
Mobile
IPSEC
Symmetric algorithm
Passive network attack
18. Is the person who is attempting to log on really who they say they are? What form of access control does this questions stem from?
Users can gain access to any resource upon request (assuming they have proper permissions)
Authentication
Log files
Assignment
19. Intentionally embedding secret data into a picture or some form of media is known as Steganographyor data ___________.
Wild
Data Hiding
Acceptance - Transfer - Mitigate
Not rigid
20. Which layer of the OSI model handles encryption?
IDEA algorithm
Presentation Layer - L6
Phreaks
Unix / Linux based security tools?
21. EDI (Electronic Data Interchange) differs from e- Commerce in that it ___________________.
Layer 3 - Host to Host
involves only computer to computer transactions
CVE - Common Vulnerabilities and Exposures
Not rigid
22. __________________ will have weird characters printed at the beginning or end of an email message - what would it be anindication of?
Buffer Overflow
C2
A PGP Signed message
Gathering digital evidence
23. Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.
Logic bombs
Assignment
Privacy violations
Layer 7 - Application
24. Accounting - Authentication - and ____________ are the AAAs of information security.
Authorization
Fixed length
Not very difficult to break.
Detective
25. To help managers find the correct cost balance between risks and countermeasures
Class A: 1-126 - Class B: 128-191 - Class C: 192-223
Presentation Layer - L6
Cisco
Main goal of a risk management program
26. Digital Certificates use which protocol?
DSS - Digital Signature Standard
X.509
Depcrypting
SET
27. A one way hash converts a string of random length into a _______________ encrypted string.
Not very difficult to break.
Presentation Layer - L6
Fixed length
a good password policy
28. Allows File owners to determine access rights.
Presentation Layer - L6
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Decentralized access control
Environmental
29. ____ members of the staff need to be educated in disaster recovery procedures.
Residual risk
Passive network attack
All
Unix / Linux based security tools?
30. The IDEA algorithm (used in PGP) is _______ bits long.
To make user certificates available to others
128
Risk assessment
Reboot or system startup
31. The ability to adjust access control to the exact amount of permission necessary is called ______________.
S/Key - OPIE
product development life cycle
Granularity
Test virus
32. EICAR is an example of a _____________ used to test AV products without introducing a live virus into the network.
Test virus
Host based - network based
Certificate
Ethernet
33. What term describes the amount of risk that remains after the countermeasures have been deployed and the vulnerabilities classified?
Log files
Layer 7 - Application
Residual risk
Directive
34. Identifying specific attempts to penetrate systems is the function of the _______________.
Phreaks
Separation of Duties
Intrusion Detection System
Passfilt.dll
35. Consists of checking for Minimum password length - Password aging - Password Strength - Blank Passwords?
Off site in a climate controlled area
Password audit
Stateful Inspection
Privacy violations
36. ________ is the authoritative entity which lists port assignments
Protection of data from unauthorized users
Data Classification
IANA
involves only computer to computer transactions
37. Vulnerability x Threat = RISK is an example of the _______________.
CERT - SANS - CERIAS - COAST
Warning banners
involves only computer to computer transactions
Risk Equation
38. If your telephone company suddenly started billing you for caller ID and call forwarding without your permission - this practice is referred to as __________________.
Layers 5 - 6 - & 7 - Session - Presentation - and Application Layers
Symmetric algorithm
Cramming
Main goal of a risk management program
39. What type of software can be used to prevent - detect (and possibly correct) malicious activities on a system?
All
a good password policy
Warning Banner
Personal Firewall - IDS - host based - Antivirus
40. Committing computer crimes in such small doses that they almost go unnoticed.
Sniffer
Residual risk
TIGER
Salami attack
41. Which major vendor adopted TACACS into its product line as a form of AAA architecture?
CHAP
Social Engineering
SLE - Single Loss Expectancy
Cisco
42. A formula used in Quantitative risk analysis
Also
SLE - Single Loss Expectancy
Users can gain access to any resource upon request (assuming they have proper permissions)
Stealth viruses
43. Examples of One- Time Password technology
Log files
MAC - Mandatory Access Control
SSL
S/Key - OPIE
44. Which of the concepts best describes Availability in relation to computer resources?
Reboot or system startup
Sued for privacy violations
a good password policy
Users can gain access to any resource upon request (assuming they have proper permissions)
45. ____________ is a file system that was poorly designed and has numerous security flaws.
NFS
Decentralized access control
Separation of Duties
product development life cycle
46. The PAP protocol sends passwords in clear text - while ____________ encrypts passwords. Both protocols are used by PPP (Point to Point Protocol) to transport IP traffic
CHAP
Layer 3 - Host to Host
Decentralized access control
Separation of Duties
47. HTTP - FTP - SMTP reside at which layer of the OSI model?
Detective
Layer 7 - Application
Logic bombs
C2
48. _______________ supply AV engines with false information to avoid detection
Risk Equation
Payload
Privacy violations
Stealth viruses
49. Name two types of Intrusion Detection Systems
Host based - network based
Main goal of a risk management program
NT Audit events
Business enabler
50. This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas
Reboot or system startup
Layer 3 - Host to Host
Quantitative analysis
Cryptanalysis
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests