SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The time it takes for a key to be pressed and then released.
Extreme temperatures
Dwell Time
Account expiration
Blacklisting Software
2. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Role Based Access Control
Identity management
Mouse Trapping
Electronic Vandal
3. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Server-Side
Dwell Time
Cloud computing
Proximity reader
4. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Router
Virtualization
Bluejacking
Identity management
5. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Human memory
Stateful packet filtering
Bluejacking
CCTV
6. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Fake Antivirus
Malicious code
Cybercriminals
Denial of service attack
7. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Prevention and detection
Subject
Server-Side
Firewalls
8. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
DMS (Demilitarized Zone)
Flaming
Federated identity management
Vishing
9. These accounts are user accounts that remain active after an employee has left an organization.
Testing
Orphaned
Denial of service attack
Man-in-the-Middle Attack
10. The process of giving someone permission to do or have something
Authorization
Testing
Wireless security
Character
11. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Logic Bomb
DNS
Electronic Vandal
Testing
12. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Port Scanner
MPack
Malicious Insiders
Symmetric encryption
13. Form of phishing that targets wealthy individuals.
Prevention and detection
UDP Flood
Whaling
Bluesnarfing
14. A pay-per-use computing model in which customers pay only for the computing resources they need.
Bluejacking
Insiders
Dwell Time
Cloud computing
15. A user accessing a computer system must present credentials or ____ when logging on to the system.
Authorization
Identification
Dwell Time
Proximity reader
16. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Server-Side
70
DNS Hijacking
Flaming
17. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Cyberstalking/Harassment
Denial of service attack
Replay Attack
Password Crackers
18. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Social engineering
DAC
Hybird
Man-made Threat
19. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Data
Cracker
Electronic Activist (hacktivist)
Digital Certificate
20. A ____ is designed to separate a nonsecured area from a secured area.
Load balancing
Mantrap
Replay Attack
LEAP
21. A user under Role Based Access Control can be assigned only one ____.
Role
Virtualization
Chain
Fake Antivirus
22. Broadcast storms can be prevented with ____.
Loop Protection
Content inspection
ACL
Bluesnarfing
23. Password and BioMetric
Bluejacking
Man-in-the-Middle Attack
Two factor security
Stateful Firewall
24. Viruses and worms are said to be self-____.
Drive-by Download
Replicating
Tailgate sensors
Authentication
25. An attack that forces a user to unintentionally click a link.
DAC
Root
Rogue
Clickjacking
26. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Bluejacking
Buffer Overflow
White Hat
DAP
27. A set of permissions that are attached to an object.
ACL
Fencing
UDP Flood
Malicious code
28. A firewall that can block designated types of traffic from entering a protected network.
Zone transfer
Token
Cognitive biometrics
Content-Filtering Firewall
29. Often used for managing user access to one or more systems.
Character
Rule Based Access Control
DLP
Subject
30. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Honeypot
Router
ARP Poisoning
WEP (Wired Equivalent Privacy)
31. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
DAC
White Hat
Zone transfer
Adware
32. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Stateful packet filtering
Subject
Electronic Vandal
Private
33. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Association request
Environmental Threat
Cyberbullying
History
34. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Federated identity management
Bluesnarfing
Operation
Stateful Firewall
35. A method for confirming users' identities
Identity Theft
Locking Cabinets
Authentication
Physical security
36. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Authentication request
Denial of service attack
Brute Force Attack
Electronic Activist (hacktivist)
37. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Swiss Cheese
Firewalls
Electronic Activist (hacktivist)
Replicating
38. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Orphaned
Cyberstalking/Harassment
Backup scope
Electronic eavesdropping
39. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Zone transfer
Vishing
Denial of service attack
Replay
40. Allows a single access point to service different types of users.
Packet tampering
Physical security access control measures
Replay
Wireless VLANs
41. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Role Based Access Control
ARP Poisoning
Security
42. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Dumpster Diving
Digital Certificate
Drive-by Download
LEAP
43. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Internal Threat
Geometric variance
ICMP Flood
Chain
44. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
CCTV
External Threat
Authentication request
Load balancing
45. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Subject
Eavesdropping Attack
Role Based Access Control
Spimming
46. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Mouse Trapping
ACL (Access Control List)
Token
CardSpace
47. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Honeynet
What is asymmetic encryption?
Black Hat
Malicious Insiders
48. Forwards packets across computer networks.
Cyberbullying
BioMetric devices
Router
White box
49. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Standard biometrics
Spear Phishing
Dumpster Diving
Cyberterrorist
50. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Session hijacking
ICMP Flood
GIF Layering
Spear Phishing