SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ____ is a network set up with intentional vulnerabilities.
Port Scanner
Symmetric encryption
DMS (Demilitarized Zone)
Honeynet
2. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Worm
Subject
Authorization
Standard biometrics
3. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Worm
History
Cracker
Backup frequency
4. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Bluejacking
Brute Force Attack
Content inspection
Cognitive biometrics
5. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Amart card
Bluesnarfing
History
Distributed Denial of Service (DDoS)
6. These attacks may allow an attacker to construct LDAP statements based on user input statements.
LDAP injection
Packet filtering
Cipher locks
Scatternet
7. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
White Hat
Association request
Access Control
Firewalls
8. When organizations use software that filters content to prevent the transmission of unauthorized information
Content inspection
Content filtering
Mandatory Access Control
Man-made Threat
9. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Web security gateway
Hybird
Replay
ACL (Access Control List)
10. People very knowledgeable about computers who use their knowledge to invade other people's computers
Amart card
Wireless VLANs
Hoaxes
Hacker
11. Form of phishing that targets wealthy individuals.
DMS (Demilitarized Zone)
Speech recognition
Web security gateway
Whaling
12. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Bluesnarfing
Cognitive biometrics
What is asymmetic encryption?
70
13. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
SSO
Character
Extreme Humidity
14. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Fake Antivirus
Brute Force
SYN Flood
Spimming
15. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Cyberstalking/Harassment
Session hijacking
Rainbow Tables
16. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Impersonation
Amart card
DLP
Tailgate sensors
17. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Separation of duties
White Hat
Mouse Trapping
Tailgating
18. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
External Threat
Testing
Denial of service attack
Challenge
19. The action that is taken by the subject over the object is called a ____.
Distributed storage
Proximity reader
Operation
Man-in-the-Middle Attack
20. A set of permissions that are attached to an object.
ACL
Content inspection
Authentication request
Evil Twin
21. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Denial of service attack
CCTV
OAuth
Bluesnarfing
22. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
DNS
Rule Based Access Control
Dwell Time
CCTV
23. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Impersonation
Role
Insiders
24. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
GIF Layering
Hybird
What is asymmetic encryption?
Floor Guard
25. Related to the perception - thought process - and understanding of the user.
LDAP injection
Cognitive biometrics
Mandatory Access Control
Sniffer
26. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Distributed Denial of Service (DDoS)
Prevention and detection
Password
Word Splitting
27. These accounts are user accounts that remain active after an employee has left an organization.
ARP Poisoning
Orphaned
Malicious code
Trusted OS
28. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Black Hat
Stateful packet filtering
LDAP injection
Packet filtering
29. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Scatternet
SYN Flood
Extreme temperatures
Cybercriminals
30. Four interrelated aspects to _________:Access - data - infrastructure - computers
External Threat
Physical security
Replay Attack
Firewall logs
31. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Malicious code
Electronic Activist (hacktivist)
Encryption
Flaming
32. The process of giving someone permission to do or have something
Kerberos
Authorization
What is asymmetic encryption?
Script Kiddie
33. The weakness of passwords centers on ____.
Bluesnarfing
Human memory
Cyberbullying
Cyberterrorist
34. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Stateful Firewall
Role
Cyberterrorist
Hoaxes
35. A ____ encrypts all data that is transmitted between the remote device and the network.
VPN
Adware
Honeypot
Speech recognition
36. Small electronic devices that change user passwords automatically
Token
Flaming
computer footprint
Encryption
37. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Spoofing
Symmetric encryption
Spimming
Cyberstalking/Harassment
38. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
IEEE 802.1x
War Driving
Private
Mandatory Access Control
39. An AP that is set up by an attacker.
Evil Twin
Floor Guard
Sniffer
Internal Threat
40. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Buffer Overflow
Private
Physical security
Identity Theft
41. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Smurf Attack
Brute Force Attack
70
Rogue
42. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Spear Phishing
Malicious code
Root
Identity Theft
43. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Reverse proxy
Three-Way Handshake
Rootkit
Root
44. Sending high volumes of UDP requests to a target.
UDP Flood
EAP
Password
Physical security
45. An attack that forces a user to unintentionally click a link.
Dumpster Diving
UDP Flood
Clickjacking
Account expiration
46. Using a single authentication credential that is shared across multiple networks.
Three-Way Handshake
Root
Protocol analyzer
Identity management
47. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Resident
GIF Layering
Extreme temperatures
Spear Phishing
48. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
UDP Flood
Backup scope
Macro
Kerberos
49. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Biometrics
Cyberbullying
Proximity reader
Authorization
50. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Client_Hello
NAT
PAT
Loop Protection