SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Hybird
White Hat
Vishing
Cipher locks
2. Often used for managing user access to one or more systems.
Rule Based Access Control
Three-Way Handshake
Stateful Firewall
CardSpace
3. Can be used to determine whether new IP addresses are attempting to probe the network.
Separation of duties
Firewall logs
Hacker
Replay Attack
4. Web application attacks are considered ____ attacks.
DMS (Demilitarized Zone)
DNS poisoning
Spyware
Server-Side
5. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
History
Firewalls
Proximity reader
Loop Protection
6. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Separation of duties
Bluejacking
Fencing
Vishing
7. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Authentication request
Honeypot
SSO
Internal Threat
8. The process of giving someone permission to do or have something
Locking Cabinets
Rootkit
Replicating
Authorization
9. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Swiss Cheese
GIF Layering
DNS Log
Port Scanner
10. The process of verifying that your backups actually work
Honeypot
NAT
Testing
Packet tampering
11. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Mouse Trapping
Roller barrier
Adware
Shoulder Surfing
12. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Replicating
Token
Access Control
Buffer Overflow
13. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Three-Way Handshake
Smurf Attack
Flashing
White Hat
14. Four interrelated aspects to _________:Access - data - infrastructure - computers
Dumpster Diving
Physical security
Smurf Attack
Stateless Firewall
15. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Replay
Reverse proxy
Flashing
Spimming
16. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Electronic Vandal
Private
computer footprint
Cyberbullying
17. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Extreme temperatures
Hash encoding
Cyberstalking/Harassment
Chain
18. These accounts are user accounts that remain active after an employee has left an organization.
VPN
Mantrap
Orphaned
Role
19. A group of piconets in which connections exist between different piconets is called a ____.
Amart card
Replay
Flaming
Scatternet
20. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Role Based Access Control
Trojan-horse virus
Spimming
Bluesnarfing
21. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Separation of duties
PAT
MPack
Bluejacking
22. ____ can be prewired for electrical power as well as wired network connections.
Amart card
Encryption
What is asymmetic encryption?
Locking Cabinets
23. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
computer footprint
Eavesdropping Attack
Social engineering
Hoaxes
24. Due to the limitations of online guessing - most password attacks today use ____.
DNS
Orphaned
Offline cracking
Resident
25. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Environmental Threat
Firewall logs
Evil Twin
Distributed
26. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Password
Stateful Firewall
Roller barrier
27. The time it takes for a key to be pressed and then released.
Dwell Time
Firewalls
Authentication
Identity Theft
28. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Root
SYN Flood
Bluejacking
Man-in-the-Middle Attack
29. Below 70 degrees or above 75 degrees
Mantrap
ACL (Access Control List)
Extreme temperatures
ACL
30. An attack that forces a user to unintentionally click a link.
Denial of service attack
DNS Log
Clickjacking
SYN Flood
31. Broadcast storms can be prevented with ____.
Clickjacking
Swiss Cheese
Operation
Loop Protection
32. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Natural Threat
Offline cracking
DLP
Virus
33. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
computer footprint
Replay
Cyberbullying
LDAP injection
34. A secret combination of letters - numbers - and/or characters that only the user should know.
Cognitive biometrics
Cracker
Vishing
Password
35. Indicates when an account is no longer active.
Distributed storage
Account expiration
What is asymmetic encryption?
Resident
36. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Environmental Threat
DNS Hijacking
Separation of duties
Client_Hello
37. ____ attacks are responsible for half of all malware delivered by Web advertising.
Cognitive biometrics
Malicious Insiders
Distributed
Fake Antivirus
38. Forwards packets across computer networks.
BioMetric devices
Spoofing
Three-Way Handshake
Router
39. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Three-Way Handshake
Zone transfer
Reverse proxy
DNS Log
40. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Script Kiddie
Replay
Router
Operation
41. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Physical security
Eavesdropping Attack
Physical security access control measures
Stateful Firewall
42. Content filtering - encryption - firewalls
Separation of duties
Floor Guard
Prevention and detection
Digital Certificate
43. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
MPack
Data
Physical security access control measures
44. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Chain
CardSpace
Identity management
Port Scanner
45. Hides inside other software - usually as an attachment or a downloadable file
Proximity reader
Trojan-horse virus
Smurf Attack
ARP Poisoning
46. A pay-per-use computing model in which customers pay only for the computing resources they need.
Content inspection
Cloud computing
Packet tampering
Cyberstalking/Harassment
47. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Content-Filtering Firewall
Information security
Impersonation
LDAP injection
48. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
ICMP Flood
Testing
Vishing
Brute Force Attack
49. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Malicious Insiders
Virtualization
Stateless Firewall
Character
50. ____ is an image spam that is divided into multiple images.
GIF Layering
Fencing
Extreme Humidity
DMS (Demilitarized Zone)
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests