SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Wireless VLANs
Token
Security
Smurf Attack
2. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Speech recognition
Cognitive biometrics
Cipher locks
Shoulder Surfing
3. Provides a greater degree of security by implementing port-based authentication.
Mantrap
Load balancing
IEEE 802.1x
Three-Way Handshake
4. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Cybercriminals
DLP
Vishing
Password Crackers
5. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
MPack
Distributed
Resident
War Driving
6. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Content filtering
Resident
Port Scanner
Amart card
7. Allows a single access point to service different types of users.
Fencing
Drive-by Download
ACL
Wireless VLANs
8. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
computer footprint
Amart card
Spimming
Fencing
9. Often used for managing user access to one or more systems.
Bluejacking
Rule Based Access Control
Protocol analyzer
Cloud computing
10. Holds the promise of reducing the number of usernames and passwords that users must memorize.
SSO
SYN Flood
NAT
Hardware Attack
11. How secure the data in your backups is-can use physical security or encryption
Proximity reader
Security
Smurf Attack
VPN
12. ____ attacks are responsible for half of all malware delivered by Web advertising.
Physical security
Fake Antivirus
Scatternet
Boot
13. Can also capture transmissions that contain passwords.
Protocol analyzer
Content filtering
White Hat
Role Based Access Control
14. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Client_Hello
Man-in-the-Middle Attack
Cipher locks
Insiders
15. A ____ virus infects the Master Boot Record of a hard disk drive.
Electronic Vandal
DMS (Demilitarized Zone)
Boot
Geometric variance
16. Broadcast storms can be prevented with ____.
Geometric variance
DNS Log
WEP (Wired Equivalent Privacy)
Loop Protection
17. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Extreme temperatures
TCP/IP
Extreme Humidity
Denial of service attack
18. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Trojan-horse virus
Hoaxes
WEP (Wired Equivalent Privacy)
SYN Flood
19. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Chain
Cyber Theft
Geometric variance
What is asymmetic encryption?
20. It is able to code and decode data
Man-in-the-Middle Attack
ICMP Flood
Symmetric encryption
Stateless Firewall
21. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Content filtering
Brute Force
computer footprint
Data
22. Set of rules that allow or deny traffic
Word Splitting
Operation
Rogue
Packet filtering
23. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Flashing
ACL
Server-Side
Operation
24. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Backup frequency
Drive-by Download
Testing
Content inspection
25. Software that can guess passwords
Server-Side
Password Crackers
Spyware
Brute Force Attack
26. A technology that can help to evenly distribute work across a network.
CHAP (Challenge Handshake Authentication Protocol)
Load balancing
Mantrap
DNS poisoning
27. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Virus
Identity Theft
Replicating
Security
28. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Eavesdropping Attack
Virus
Social engineering
Logic Bomb
29. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Association request
OAuth
Roller barrier
Stateful packet filtering
30. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Port Scanner
Data
Wireless security
Bluejacking
31. ____ is an image spam that is divided into multiple images.
GIF Layering
Role Based Access Control
Cipher locks
White box
32. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Distributed Denial of Service (DDoS)
Private
Word Splitting
Dwell Time
33. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Private
PAT
GIF Layering
Sniffer
34. Requires mutual authentication used for WLAN encryption using Cisco client software.
Cybercriminals
Cognitive biometrics
LEAP
Standard biometrics
35. Below 70 degrees or above 75 degrees
Extreme temperatures
Man-in-the-Middle Attack
Cipher locks
Biometrics
36. A ____ does not serve clients - but instead routes incoming requests to the correct server.
computer footprint
Password Crackers
Reverse proxy
White Hat
37. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Word Splitting
Hybird
Media for backups
Honeypot
38. Indicates when an account is no longer active.
SYN Flood
Cloud computing
Account expiration
Wireless security
39. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
CCTV
Cyberbullying
OAuth
40. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
DNS poisoning
SYN Flood
SSO
Cognitive biometrics
41. These attacks may allow an attacker to construct LDAP statements based on user input statements.
LDAP injection
Scatternet
DMS (Demilitarized Zone)
DAC
42. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Extreme Humidity
Cracker
White Hat
Cyber Theft
43. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
CHAP (Challenge Handshake Authentication Protocol)
History
Word Splitting
Operation
44. An AP that is set up by an attacker.
WEP (Wired Equivalent Privacy)
ACL
Authorization
Evil Twin
45. Securing a restricted area by erecting a barrier is called ____.
Fencing
Natural Threat
SYN Flood
Geometric variance
46. ____ involves horizontally separating words - although it is still readable by the human eye.
Encryption
DNS poisoning
LEAP
Word Splitting
47. Web application attacks are considered ____ attacks.
Shoulder Surfing
Server-Side
CHAP (Challenge Handshake Authentication Protocol)
Virus
48. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
70
Wireless security
Worm
Impersonation
49. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Hoaxes
Shoulder Surfing
Stateful packet filtering
Worm
50. An attack that forces a user to unintentionally click a link.
Loop Protection
Client_Hello
Proximity reader
Clickjacking