SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Adware
NAT
Character
Port Scanner
2. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Replay
Logic Bomb
Hybird
Cognitive biometrics
3. A technology that can help to evenly distribute work across a network.
Malicious code
Ciphertext
Load balancing
Blacklisting Software
4. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Client_Hello
Geometric variance
Malicious Insiders
Boot
5. A variety of threats such as viruses - worms - and Trojan horses
LEAP
Fencing
Malicious code
Account expiration
6. Scrambles information into an alternative form that requires a key or password to decrypt the information
WEP (Wired Equivalent Privacy)
Encryption
Honeynet
Web security gateway
7. An attack that forces a user to unintentionally click a link.
BioMetric devices
Cyberstalking/Harassment
Clickjacking
Web security gateway
8. Form of phishing that targets wealthy individuals.
Whaling
Web security gateway
CardSpace
Cracker
9. A firewall capable of monitoring a data stream from end to end.
Stateful Firewall
ACL (Access Control List)
EAP
Cloud computing
10. The process of giving someone permission to do or have something
Authorization
War Driving
Bluesnarfing
Wireless security
11. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Buffer Overflow
Wireless security
DLP
Phishing
12. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Bluejacking
Content inspection
Orphaned
Ciphertext
13. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
ICMP Flood
Authentication request
Kerberos
Cyber Theft
14. Viruses and worms are said to be self-____.
Cyberbullying
Replicating
Session hijacking
Bluesnarfing
15. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Port Scanner
Flaming
Physical security access control measures
Roller barrier
16. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Spyware
Flashing
Offline cracking
Password
17. Indicates when an account is no longer active.
Account expiration
Role
Virus
Vishing
18. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Operation
DNS poisoning
BioMetric devices
Content-Filtering Firewall
19. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
PAT
Trojan-horse virus
Reverse proxy
Separation of duties
20. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Character
Encryption
Black Hat
Roller barrier
21. A form of filtering that blocks only sites specified as harmful.
Operation
Internal Threat
Whaling
Blacklisting Software
22. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Server-Side
Dumpster Diving
White box
Brute Force Attack
23. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Server-Side
Buffer Overflow
Hardware Attack
BioMetric devices
24. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Biometrics
CHAP (Challenge Handshake Authentication Protocol)
Web security gateway
Data
25. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Fencing
Character
Trusted OS
Spimming
26. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Electronic Vandal
Client_Hello
Replay Attack
Identity management
27. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Distributed storage
Natural Threat
DNS
WEP (Wired Equivalent Privacy)
28. It accepts spoken words for input as if they had been typed on the keyboard.
Speech recognition
WEP (Wired Equivalent Privacy)
Offline cracking
Identification
29. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Role
Natural Threat
Floor Guard
Biometrics
30. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Human memory
Man-made Threat
Private
ACL (Access Control List)
31. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Eavesdropping Attack
Firewall logs
Geometric variance
Environmental Threat
32. Allows a single access point to service different types of users.
Insiders
Macro
War Driving
Wireless VLANs
33. How secure the data in your backups is-can use physical security or encryption
Fencing
DMS (Demilitarized Zone)
Security
Authentication request
34. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Router
DAC
TCP/IP
Electronic eavesdropping
35. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Authorization
DAP
Two factor security
Bluejacking
36. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Chain
Distributed Denial of Service (DDoS)
Bluejacking
Content filtering
37. It is able to code and decode data
DNS poisoning
Symmetric encryption
Content-Filtering Firewall
Physical security
38. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Content inspection
Environmental Threat
War Driving
Bluesnarfing
39. A private key and public key
Hoaxes
What is asymmetic encryption?
Honeynet
DAC
40. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Content inspection
Sniffer
computer footprint
Script Kiddie
41. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Password Crackers
Wireless security
Cyberbullying
Brute Force
42. The weakness of passwords centers on ____.
Human memory
Character
Electronic Vandal
Chain
43. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
PAT
Packet filtering
Electronic Activist (hacktivist)
Bluesnarfing
44. A ____ means that the application or service assigned to that port is listening for any instructions.
Router
Macro
Bluesnarfing
Open Port
45. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Cybercriminals
ARP Poisoning
Two factor security
DAP
46. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Role Based Access Control
DLP
Root
Testing
47. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Two factor security
Flashing
Backup scope
Testing
48. An authentication process that involves three steps.
Cracker
PAT
Three-Way Handshake
Symmetric encryption
49. Software that can guess passwords
Password Crackers
Electronic Vandal
Resident
SSO
50. Can also capture transmissions that contain passwords.
Protocol analyzer
Load balancing
What is asymmetic encryption?
Open Port