SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Hybird
Ciphertext
Shoulder Surfing
LEAP
2. A ____ virus infects the Master Boot Record of a hard disk drive.
Boot
Stateful packet filtering
Two factor security
Backup frequency
3. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Trusted OS
Brute Force Attack
IEEE 802.1x
4. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Ciphertext
Kerberos
Security
Script Kiddie
5. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Floor Guard
Two factor security
Logic Bomb
Cyber Theft
6. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Evil Twin
Content-Filtering Firewall
Rootkit
Stateless Firewall
7. Sending high volumes of ICMP (usually ping) packets to a target.
Packet tampering
ICMP Flood
Challenge
Virtualization
8. Sifting through a company's garbage to find information to help break into their computers
CardSpace
Dumpster Diving
Cognitive biometrics
White Hat
9. Below 70 degrees or above 75 degrees
Mouse Trapping
Encryption
Extreme temperatures
70
10. A technique that allows private IP addresses to be used on the public Internet.
Dwell Time
Authentication request
NAT
Content filtering
11. When DNS servers exchange information among themselves it is known as a ____.
Cyber Theft
Zone transfer
Client_Hello
Honeypot
12. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Association request
LDAP injection
IEEE 802.1x
Ciphertext
13. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Private
Drive-by Download
Router
Distributed
14. Hides inside other software - usually as an attachment or a downloadable file
DNS poisoning
Environmental Threat
SSO
Trojan-horse virus
15. Sending high volumes of UDP requests to a target.
UDP Flood
MPack
RADIUS
Evil Twin
16. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Whaling
Cloud computing
ICMP Flood
17. A security analysis of the transaction within its approved context.
Replicating
Biometrics
Content-Filtering Firewall
Content inspection
18. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
Server-Side
GIF Layering
Cyberbullying
19. A firewall that can block designated types of traffic from entering a protected network.
CCTV
Content-Filtering Firewall
EAP
Data
20. A threat that originates from outside the company. (ex. power failure.)
Impersonation
Password
DAC
External Threat
21. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Mandatory Access Control
Phishing
DAP
Rainbow Tables
22. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Offline cracking
Authorization
Environmental Threat
Rainbow Tables
23. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
Environmental Threat
Biometrics
Load balancing
24. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Physical security
Scatternet
Data
Man-in-the-Middle Attack
25. An authentication process that involves three steps.
Information security
Tailgate sensors
Cloud computing
Three-Way Handshake
26. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Boot
Hardware Attack
Drive-by Download
Roller barrier
27. A user under Role Based Access Control can be assigned only one ____.
Honeypot
Router
Spimming
Role
28. These attacks may allow an attacker to construct LDAP statements based on user input statements.
LDAP injection
Virus
CardSpace
Hoaxes
29. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
External Threat
Symmetric encryption
Kerberos
DLP
30. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Spear Phishing
Session hijacking
CCTV
Smurf Attack
31. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Trusted OS
Content filtering
CardSpace
Smurf Attack
32. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
MPack
Natural Threat
Challenge
SYN Flood
33. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Access Control
DLP
Standard biometrics
White Hat
34. ____ attacks are responsible for half of all malware delivered by Web advertising.
Fake Antivirus
Resident
Bluesnarfing
Roller barrier
35. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Brute Force Attack
Ciphertext
Zone transfer
Geometric variance
36. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
OAuth
Packet tampering
Fencing
Client_Hello
37. Viruses and worms are said to be self-____.
Server-Side
Script Kiddie
DNS Log
Replicating
38. A variety of threats such as viruses - worms - and Trojan horses
Malicious code
Virus
CHAP (Challenge Handshake Authentication Protocol)
Zone transfer
39. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Backup scope
DNS
Insiders
Association request
40. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Amart card
TACACS
CCTV
Flashing
41. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Stateless Firewall
Replicating
Fencing
Challenge
42. A ____ is designed to separate a nonsecured area from a secured area.
Three-Way Handshake
Authentication
Impersonation
Mantrap
43. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Spyware
Rogue
Spimming
44. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Distributed storage
Mouse Trapping
Prevention and detection
Script Kiddie
45. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Chain
Private
Packet tampering
Brute Force
46. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Content-Filtering Firewall
70
Open Port
Extreme temperatures
47. Pretending to be another person.
Association request
Word Splitting
Impersonation
Bluesnarfing
48. Allows a single access point to service different types of users.
Account expiration
Wireless VLANs
Chain
Role
49. An attack that forces a user to unintentionally click a link.
EAP
Impersonation
Orphaned
Clickjacking
50. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Smurf Attack
Operation
Cyber Theft
Backup scope