SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These accounts are user accounts that remain active after an employee has left an organization.
Man-made Threat
Orphaned
Federated identity management
Server-Side
2. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Digital Certificate
Script Kiddie
Physical security access control measures
Dwell Time
3. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Man-in-the-Middle Attack
Cloud computing
DNS Hijacking
Bluesnarfing
4. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Brute Force
SYN Flood
Bluejacking
Cipher locks
5. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Mouse Trapping
Access Control
Cipher locks
Brute Force Attack
6. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Rainbow Tables
Cyberstalking/Harassment
Drive-by Download
Adware
7. Pretending to be another person.
Hardware Attack
Speech recognition
Impersonation
OAuth
8. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Electronic Vandal
LEAP
Challenge
Replay Attack
9. It accepts spoken words for input as if they had been typed on the keyboard.
Speech recognition
Amart card
Dumpster Diving
Whaling
10. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Fencing
Protocol analyzer
Password
DNS poisoning
11. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
Extreme Humidity
Adware
Locking Cabinets
12. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Sniffer
IEEE 802.1x
DNS
LEAP
13. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Protocol analyzer
Rainbow Tables
History
Media for backups
14. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
LDAP injection
Content inspection
Hybird
Virus
15. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Account expiration
Hoaxes
Content inspection
Distributed Denial of Service (DDoS)
16. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Cognitive biometrics
Client_Hello
Operation
Smurf Attack
17. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Electronic eavesdropping
Cyber Theft
LEAP
Distributed Denial of Service (DDoS)
18. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Natural Threat
computer footprint
Subject
Locking Cabinets
19. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
70
Smurf Attack
Password Crackers
Mantrap
20. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
TACACS
Flashing
Kerberos
Resident
21. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Impersonation
Roller barrier
Floor Guard
Evil Twin
22. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Rootkit
Testing
computer footprint
Spear Phishing
23. Can be used to determine whether new IP addresses are attempting to probe the network.
Rogue
Firewall logs
TCP/IP
Association request
24. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Three-Way Handshake
Hardware Attack
Spoofing
UDP Flood
25. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Cognitive biometrics
Cybercriminals
Blacklisting Software
Natural Threat
26. Securing a restricted area by erecting a barrier is called ____.
Honeypot
Fencing
Protocol analyzer
TACACS
27. A firewall capable of monitoring a data stream from end to end.
Server-Side
Amart card
Stateful Firewall
Packet tampering
28. Often used for managing user access to one or more systems.
Rule Based Access Control
Cloud computing
Buffer Overflow
ACL (Access Control List)
29. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Drive-by Download
Honeynet
Testing
Wireless security
30. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Identity management
ACL (Access Control List)
Sniffer
White box
31. A group of piconets in which connections exist between different piconets is called a ____.
Two factor security
White Hat
Challenge
Scatternet
32. ____ involves horizontally separating words - although it is still readable by the human eye.
War Driving
Mantrap
Spear Phishing
Word Splitting
33. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Electronic eavesdropping
Private
LEAP
DNS Hijacking
34. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Impersonation
Rogue
Protocol analyzer
ARP Poisoning
35. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
Physical security
TACACS
Federated identity management
36. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Macro
Session hijacking
Zone transfer
Drive-by Download
37. Password and BioMetric
Content filtering
Account expiration
Two factor security
Flashing
38. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Virus
Challenge
Cyberbullying
Roller barrier
39. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Replay Attack
Word Splitting
Eavesdropping Attack
Role Based Access Control
40. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Web security gateway
Tailgate sensors
Port Scanner
Cyber Theft
41. Could become a key element in authentication in the future.
Cognitive biometrics
Role
Server-Side
DNS poisoning
42. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Subject
Password
Hoaxes
Protocol analyzer
43. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
DNS Log
Electronic Vandal
History
War Driving
44. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
DNS
Flaming
ARP Poisoning
Standard biometrics
45. Below 70 degrees or above 75 degrees
Mouse Trapping
Extreme temperatures
EAP
Prevention and detection
46. A technology that can help to evenly distribute work across a network.
DAC
Load balancing
Content inspection
Distributed
47. How secure the data in your backups is-can use physical security or encryption
Logic Bomb
Security
Character
Load balancing
48. A user accessing a computer system must present credentials or ____ when logging on to the system.
Cyberbullying
Identification
Operation
Extreme Humidity
49. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Swiss Cheese
External Threat
SSO
50. A ____ means that the application or service assigned to that port is listening for any instructions.
Physical security
Evil Twin
Open Port
Geometric variance