SSCP: Systems Security Certified Practitioner MCQs

SSCP: Systems Security Certified Practitioner MCQs

These SSCP: Systems Security Certified Practitioner multiple-choice questions and their answers will help you strengthen your grip on the subject of SSCP: Systems Security Certified Practitioner. You can prepare for an upcoming exam or job interview with these 30 SSCP: Systems Security Certified Practitioner MCQs.
So scroll down and start answering.

1: Digital Certificates use which protocol?

A.   CERT - SANS - CERIAS - COAST

B.   Environmental

C.   X.509

D.   Symmetric algorithm

2: System users.

A.   Passive network attack

B.   Decentralized access control

C.   ISO

D.   S/Key - OPIE

3: Which of the following is NOT and encryption algorithm?

A.   Passive network attack

B.   Directive

C.   SSL

D.   Preserve electronic evidence and protect it from any alteration

4: Combine both boot and file virus behavior

A.   Multi-partite viruses

B.   Authentication

C.   0-1023

D.   Stealth viruses

5: Code Review - Certification - Accreditation - Functional Design Review - System Test Review

A.   Certificate

B.   Log files

C.   Product development life cycle

D.   Information Security policies

6: Macintosh computers are _____ at risk for receiving viruses.

A.   Also

B.   One way hash

C.   Warning Banner

D.   Virus definition downloads and system virus scans

7: Which layer of the OSI model handles encryption?

A.   Intrusion Detection System

B.   Payload

C.   Presentation Layer - L6

D.   DSS - Digital Signature Standard

8: Name two types of Intrusion Detection Systems

A.   Polymorphic

B.   Passive network attack

C.   Host based - network based

D.   Passwords

9: Used in ______________:Retinal Scanning - Fingerprints - Face Recognition - Voice Recognition

A.   Presentation Layer - L6

B.   Information

C.   Biometrics

D.   DSS - Digital Signature Standard

10: Contracting with an insurance company to cover losses due to information security breaches is known as risk __________.

A.   ISO

B.   S/Key - OPIE

C.   Assignment

D.   NFS

11: Logon and Logoff - Use of User Rights - Security Policy Change

A.   Personal Firewall - IDS - host based - Antivirus

B.   Passwords

C.   NT Audit events

D.   Data Classification

12: Main goals of an information security program

A.   Stateful Inspection

B.   Confidentiality - Availability -Integrity of data

C.   Preserve electronic evidence and protect it from any alteration

D.   Modems

13: Committing computer crimes in such small doses that they almost go unnoticed.

A.   SSL

B.   Depcrypting

C.   Salami attack

D.   Prevent - Recover - Detect

14: Data being delivered from the source to the intended receiver without being altered

A.   X.509

B.   Steps in handling incidents

C.   Decentralized access control

D.   Protection of data from unauthorized users

15: What is the main difference between computer abuse and computer crime?

A.   Acceptance - Transfer - Mitigate

B.   Granularity

C.   Intentions of the perpetrator

D.   TIGER

16: This is more time consuming - numeric values - based on Annualized Loss Expectancy (ALE) formulas

A.   Log files

B.   Quantitative analysis

C.   Confidentiality - Availability -Integrity of data

D.   Host based - network based

17: Types of firewalls: Packet Filtering - Application Proxy - and _________________.

A.   Stateful Inspection

B.   Main goal of a risk management program

C.   Intrusion Detection System

D.   Personal Firewall - IDS - host based - Antivirus

18: Which major vendor adopted TACACS into its product line as a form of AAA architecture?

A.   Warning Banner

B.   Cisco

C.   Separation of Duties

D.   Class A: 1-126 - Class B: 128-191 - Class C: 192-223

19: A boot sector virus goes to work when what event takes place?

A.   IPSEC

B.   Data Classification

C.   Reboot or system startup

D.   Buffer Overflow

20: Each password must have a combination of upper case - lower case - numbers and special characters - 6 character minimum password length - This rule is enforced by ______

A.   Passfilt.dll

B.   Main goal of a risk management program

C.   Personal Firewall - IDS - host based - Antivirus

D.   Presentation Layer - L6

21: An intrusion detection system is an example of what type of countermeasure?

A.   Detective

B.   SLE - Single Loss Expectancy

C.   To make user certificates available to others

D.   Authentication

22: Diffie Hellman - RSA - and ___________ are all examples of Public Key cryptography?

A.   Risk Equation

B.   Host based - network based

C.   DSS - Digital Signature Standard

D.   Acceptance - Transfer - Mitigate

23: A true network security audit does include an audit for _____________

A.   Host based - network based

B.   Password audit

C.   Modems

D.   Class A: 1-126 - Class B: 128-191 - Class C: 192-223

24: Which range defines 'well known ports?'

A.   Detective

B.   Stealth viruses

C.   SYN Flooding

D.   0-1023

25: Cable modems are ___________than DSL connections

A.   Warning banners

B.   Payload

C.   Less secure

D.   Certificate

26: Which auditing practice relates to the controlling of hardware - software - firmware - and documentation to insure it has not been improperly modified?

A.   Phreaks

B.   To make user certificates available to others

C.   Residual risk

D.   Configuration Control

27: Layer 4 of the OSI model corresponds to which layer of the DoD model?

A.   Cramming

B.   Risk Equation

C.   Layer 3 - Host to Host

D.   Assignment

28: It is difficult to prosecute a computer criminal if _________ are not deployed

A.   Users can gain access to any resource upon request (assuming they have proper permissions)

B.   Warning banners

C.   Granularity

D.   Main goal of a risk management program

29: This free (for personal use) program is used to encrypt and decrypt emails.

A.   X.509

B.   CHAP

C.   Preserve electronic evidence and protect it from any alteration

D.   PGP

30: They specifically target telephone networks

A.   Hoaxes

B.   Authorization

C.   Phreaks

D.   A good password policy

31: A security policy is a ___________ set of rules that must be followed explicitly in order to be effective.

A.   Data Classification

B.   Not rigid

C.   Class A: 1-126 - Class B: 128-191 - Class C: 192-223

D.   All