SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
DAP
Access Control
computer footprint
DAC
2. Can create entries in a log for all queries that are received.
Amart card
DNS Log
Electronic Activist (hacktivist)
Resident
3. A secret combination of letters - numbers - and/or characters that only the user should know.
ICMP Flood
Buffer Overflow
Password
War Driving
4. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Separation of duties
Proximity reader
External Threat
Cognitive biometrics
5. Securing a restricted area by erecting a barrier is called ____.
Fencing
Cyberstalking/Harassment
Protocol analyzer
Private
6. It is able to code and decode data
Proximity reader
Symmetric encryption
Spear Phishing
Ciphertext
7. A firewall that can block designated types of traffic from entering a protected network.
GIF Layering
Smurf Attack
Content-Filtering Firewall
Honeynet
8. Password and BioMetric
Two factor security
BioMetric devices
ICMP Flood
Access Control
9. A user accessing a computer system must present credentials or ____ when logging on to the system.
Kerberos
Authentication
Identification
Cyberbullying
10. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
White box
Black Hat
Protocol analyzer
Identity management
11. Using a single authentication credential that is shared across multiple networks.
Buffer Overflow
Spyware
Identity management
Rule Based Access Control
12. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
computer footprint
Firewalls
LDAP injection
What is asymmetic encryption?
13. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
TACACS
Media for backups
Man-in-the-Middle Attack
Authentication request
14. A group of piconets in which connections exist between different piconets is called a ____.
Spyware
Man-in-the-Middle Attack
Cognitive biometrics
Scatternet
15. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Separation of duties
Hybird
Extreme Humidity
Identity management
16. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Man-made Threat
RADIUS
Stateful Firewall
Brute Force Attack
17. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Roller barrier
Rogue
Server-Side
Authentication request
18. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Flaming
Fake Antivirus
Rule Based Access Control
Session hijacking
19. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
Boot
Stateful packet filtering
Media for backups
20. Floods a Web site with so many requests for service that it slows down or crashes the site
TACACS
Bluesnarfing
Cyberbullying
Denial of service attack
21. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Malicious Insiders
DAP
Character
Flaming
22. An AP that is set up by an attacker.
LDAP injection
Evil Twin
Rootkit
GIF Layering
23. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Association request
DNS Hijacking
LDAP injection
Packet tampering
24. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
PAT
Kerberos
Cracker
Replicating
25. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Identity Theft
DNS Log
Role Based Access Control
Content-Filtering Firewall
26. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Challenge
DAC
War Driving
27. Due to the limitations of online guessing - most password attacks today use ____.
Offline cracking
Tailgate sensors
Access Control
Mandatory Access Control
28. A set of permissions that are attached to an object.
Spear Phishing
History
ACL
Cipher locks
29. A ____ encrypts all data that is transmitted between the remote device and the network.
Firewalls
Protocol analyzer
Hoaxes
VPN
30. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Distributed
Logic Bomb
CardSpace
Identity Theft
31. The ____ model is the least restrictive.
DAC
Character
Rogue
Rootkit
32. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Rootkit
Trojan-horse virus
Stateful packet filtering
Amart card
33. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Identity management
Spimming
Testing
Distributed storage
34. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Scatternet
Script Kiddie
Proximity reader
Stateless Firewall
35. A ____ attack is similar to a passive man-in-the-middle attack.
Stateful packet filtering
Distributed
Replay
Password
36. A method for confirming users' identities
Cracker
Character
Authentication
Rootkit
37. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Insiders
Black Hat
Trusted OS
RADIUS
38. Sifting through a company's garbage to find information to help break into their computers
Dumpster Diving
Smurf Attack
Router
Locking Cabinets
39. Four interrelated aspects to _________:Access - data - infrastructure - computers
Physical security
Vishing
Honeypot
White box
40. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Media for backups
Packet tampering
CCTV
Geometric variance
41. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Spyware
CHAP (Challenge Handshake Authentication Protocol)
War Driving
Orphaned
42. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Flashing
Script Kiddie
Orphaned
What is asymmetic encryption?
43. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Zone transfer
Bluesnarfing
Social engineering
Cloud computing
44. The weakness of passwords centers on ____.
Smurf Attack
Human memory
Physical security
ACL (Access Control List)
45. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Internal Threat
White box
Bluesnarfing
Mandatory Access Control
46. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Spear Phishing
Extreme temperatures
Cybercriminals
Private
47. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
DNS poisoning
Distributed Denial of Service (DDoS)
Cognitive biometrics
Role Based Access Control
48. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Electronic Activist (hacktivist)
Logic Bomb
Replay
Internal Threat
49. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Biometrics
Extreme Humidity
Fencing
Wireless security
50. The process of giving someone permission to do or have something
Content inspection
Zone transfer
Kerberos
Authorization