SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Form of phishing that targets wealthy individuals.
Whaling
Bluesnarfing
DMS (Demilitarized Zone)
Stateful Firewall
2. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Swiss Cheese
Backup frequency
RADIUS
EAP
3. A threat that originates from outside the company. (ex. power failure.)
Packet tampering
External Threat
Macro
Three-Way Handshake
4. Wants to cause as much damage as possible - without a particular target or goal.
Malicious code
Electronic Vandal
Spoofing
Two factor security
5. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Session hijacking
OAuth
White box
Stateless Firewall
6. The time it takes for a key to be pressed and then released.
Dwell Time
Clickjacking
Bluesnarfing
Malicious code
7. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Digital Certificate
DNS
Client_Hello
Character
8. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Adware
Two factor security
Protocol analyzer
Zone transfer
9. An authentication process that involves three steps.
Identity Theft
Insiders
Physical security
Three-Way Handshake
10. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
NAT
Subject
Bluejacking
Honeypot
11. People very knowledgeable about computers who use their knowledge to invade other people's computers
Cognitive biometrics
Offline cracking
Hacker
Mandatory Access Control
12. Viruses and worms are said to be self-____.
Replicating
DLP
Black Hat
Spoofing
13. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Social engineering
CCTV
LDAP injection
Cyberstalking/Harassment
14. A group of piconets in which connections exist between different piconets is called a ____.
CCTV
ARP Poisoning
Scatternet
DNS Log
15. Could become a key element in authentication in the future.
Eavesdropping Attack
Cognitive biometrics
Clickjacking
Session hijacking
16. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Cyberstalking/Harassment
Three-Way Handshake
Shoulder Surfing
Spoofing
17. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Port Scanner
Client_Hello
Evil Twin
Web security gateway
18. An AP that is set up by an attacker.
Evil Twin
Extreme Humidity
Replay Attack
Replay
19. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Prevention and detection
Flaming
Testing
CCTV
20. Securing a restricted area by erecting a barrier is called ____.
Fencing
BioMetric devices
Federated identity management
Dwell Time
21. Below 70 degrees or above 75 degrees
Extreme temperatures
Spyware
Association request
History
22. A technique that allows private IP addresses to be used on the public Internet.
Loop Protection
70
NAT
Bluesnarfing
23. A ____ does not serve clients - but instead routes incoming requests to the correct server.
CCTV
Trojan-horse virus
Reverse proxy
Two factor security
24. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Fencing
NAT
Phishing
RADIUS
25. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
DNS
Identity Theft
Malicious Insiders
ACL
26. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Client_Hello
Environmental Threat
OAuth
Authorization
27. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Access Control
War Driving
Load balancing
Port Scanner
28. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Scatternet
Spoofing
Vishing
Role Based Access Control
29. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Physical security access control measures
VPN
UDP Flood
SYN Flood
30. Content filtering - encryption - firewalls
Mandatory Access Control
Prevention and detection
Scatternet
LDAP injection
31. A pay-per-use computing model in which customers pay only for the computing resources they need.
Man-in-the-Middle Attack
Biometrics
GIF Layering
Cloud computing
32. It is able to code and decode data
MPack
Dumpster Diving
Brute Force
Symmetric encryption
33. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Identity Theft
Stateless Firewall
Electronic Activist (hacktivist)
Bluesnarfing
34. Broadcast storms can be prevented with ____.
Boot
Root
Loop Protection
Bluejacking
35. How often you perform your backups (cost-benefit analysis of backing up)
Backup frequency
Hoaxes
Firewalls
Distributed storage
36. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
OAuth
Word Splitting
PAT
Spear Phishing
37. A technology that can help to evenly distribute work across a network.
Load balancing
CardSpace
Worm
Insiders
38. Computer crimes involving the theft of money
SYN Flood
Dumpster Diving
Hoaxes
Cyber Theft
39. When organizations use software that filters content to prevent the transmission of unauthorized information
Shoulder Surfing
Internal Threat
Distributed Denial of Service (DDoS)
Content filtering
40. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Worm
Dumpster Diving
LEAP
DAC
41. Small electronic devices that change user passwords automatically
Kerberos
Token
Stateful Firewall
Spoofing
42. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Fencing
Smurf Attack
Kerberos
Authentication request
43. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
LEAP
PAT
DNS
Electronic Activist (hacktivist)
44. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Cyberbullying
Two factor security
Rootkit
Identity management
45. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Bluesnarfing
Phishing
Word Splitting
Drive-by Download
46. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Natural Threat
Dumpster Diving
Replay Attack
Authentication
47. The ____ model is the least restrictive.
Biometrics
Electronic Vandal
DAC
Rogue
48. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Hash encoding
CHAP (Challenge Handshake Authentication Protocol)
Electronic Vandal
Environmental Threat
49. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Spyware
Smurf Attack
BioMetric devices
Dwell Time
50. A form of filtering that blocks only sites specified as harmful.
DAC
Speech recognition
Blacklisting Software
DNS
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests