SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Stateful packet filtering
Black Hat
White Hat
Backup frequency
2. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Orphaned
Shoulder Surfing
Token
3. A secret combination of letters - numbers - and/or characters that only the user should know.
TCP/IP
What is asymmetic encryption?
Password
Man-in-the-Middle Attack
4. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Cybercriminals
Server-Side
Information security
5. Broadcast storms can be prevented with ____.
Packet tampering
Loop Protection
CCTV
DMS (Demilitarized Zone)
6. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Ciphertext
Proximity reader
Tailgate sensors
Hacker
7. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Physical security
Packet tampering
War Driving
TACACS
8. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Firewalls
Password Crackers
Private
ICMP Flood
9. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Content inspection
Man-made Threat
Denial of service attack
Distributed Denial of Service (DDoS)
10. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
computer footprint
Trusted OS
OAuth
Boot
11. An authentication process that involves three steps.
Dumpster Diving
Three-Way Handshake
Server-Side
Buffer Overflow
12. A security analysis of the transaction within its approved context.
SSO
Kerberos
Blacklisting Software
Content inspection
13. A program that is automatically downloaded to your computer without your consent or even your knowledge.
ACL
Drive-by Download
Dwell Time
Rogue
14. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
NAT
Reverse proxy
Loop Protection
DNS Hijacking
15. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Session hijacking
Character
EAP
70
16. Often used for managing user access to one or more systems.
Kerberos
Replay
Rule Based Access Control
Mouse Trapping
17. The process of giving someone permission to do or have something
Account expiration
Blacklisting Software
Authorization
CHAP (Challenge Handshake Authentication Protocol)
18. Scrambles information into an alternative form that requires a key or password to decrypt the information
Subject
History
Encryption
DMS (Demilitarized Zone)
19. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Mouse Trapping
TACACS
Firewalls
Cyberbullying
20. A ____ means that the application or service assigned to that port is listening for any instructions.
Subject
Fake Antivirus
Open Port
Ciphertext
21. A private key and public key
DNS Log
What is asymmetic encryption?
Malicious code
DAC
22. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Authentication request
White box
TCP/IP
What is asymmetic encryption?
23. A technique that allows private IP addresses to be used on the public Internet.
NAT
Extreme Humidity
Honeypot
DNS poisoning
24. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Cracker
Firewall logs
Adware
Speech recognition
25. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
DAC
Cyberbullying
Macro
Spear Phishing
26. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
ARP Poisoning
TCP/IP
Speech recognition
70
27. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Packet filtering
DAC
Cyberstalking/Harassment
EAP
28. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Data
Firewalls
DNS poisoning
Bluejacking
29. Floods a Web site with so many requests for service that it slows down or crashes the site
Denial of service attack
Virus
SSO
Data
30. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Rule Based Access Control
Blacklisting Software
Proximity reader
Ciphertext
31. Form of phishing that targets wealthy individuals.
Malicious Insiders
Shoulder Surfing
Whaling
Smurf Attack
32. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
What is asymmetic encryption?
Character
EAP
CardSpace
33. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Sniffer
Virus
Information security
Offline cracking
34. A framework for transporting authentication protocols instead of the authentication protocol itself.
Protocol analyzer
EAP
Virtualization
Swiss Cheese
35. It is able to code and decode data
Physical security
Symmetric encryption
Roller barrier
DNS
36. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Physical security access control measures
ACL (Access Control List)
Encryption
CCTV
37. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Firewall logs
Brute Force
DNS poisoning
38. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Operation
Cyber Theft
Access Control
Internal Threat
39. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Identity management
Replay Attack
Zone transfer
Token
40. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Macro
Private
Phishing
Cybercriminals
41. These attacks may allow an attacker to construct LDAP statements based on user input statements.
LDAP injection
Content-Filtering Firewall
DMS (Demilitarized Zone)
Three-Way Handshake
42. How often you perform your backups (cost-benefit analysis of backing up)
Stateful Firewall
Backup frequency
Flashing
Word Splitting
43. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Cloud computing
Roller barrier
Sniffer
Port Scanner
44. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
TCP/IP
Role Based Access Control
Packet filtering
45. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Boot
War Driving
Encryption
Malicious Insiders
46. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Electronic Vandal
SSO
Fake Antivirus
White Hat
47. A ____ is a network set up with intentional vulnerabilities.
Honeynet
White Hat
Loop Protection
Federated identity management
48. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Private
Federated identity management
Loop Protection
Worm
49. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Wireless security
Reverse proxy
Shoulder Surfing
Natural Threat
50. A ____ is designed to separate a nonsecured area from a secured area.
Man-made Threat
Password
Rootkit
Mantrap