SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ensures that messages are not corrupt or tampered with
Replay
Authorization
Hash encoding
Cloud computing
2. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Flashing
Buffer Overflow
Cyberstalking/Harassment
Bluesnarfing
3. Could become a key element in authentication in the future.
Cognitive biometrics
Proximity reader
Hybird
Logic Bomb
4. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Private
Honeypot
Social engineering
Hardware Attack
5. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
computer footprint
70
Environmental Threat
Flashing
6. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Evil Twin
Proximity reader
Web security gateway
Natural Threat
7. Allows a single access point to service different types of users.
Man-in-the-Middle Attack
Wireless VLANs
Bluesnarfing
Extreme Humidity
8. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Media for backups
Phishing
Worm
Logic Bomb
9. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
RADIUS
Bluejacking
Spyware
DLP
10. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Access Control
Buffer Overflow
Challenge
Encryption
11. Software that can guess passwords
Password Crackers
Reverse proxy
Firewall logs
Hash encoding
12. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Spoofing
Eavesdropping Attack
Firewall logs
Honeypot
13. Due to the limitations of online guessing - most password attacks today use ____.
Password Crackers
DNS Hijacking
Offline cracking
Authentication request
14. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Flaming
Ciphertext
Cyberterrorist
Proximity reader
15. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Internal Threat
Brute Force
Resident
Extreme temperatures
16. Provides a greater degree of security by implementing port-based authentication.
Ciphertext
History
Bluesnarfing
IEEE 802.1x
17. Can be used to determine whether new IP addresses are attempting to probe the network.
Backup frequency
Firewall logs
Spear Phishing
Kerberos
18. Sending high volumes of UDP requests to a target.
UDP Flood
Three-Way Handshake
Encryption
Malicious Insiders
19. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Geometric variance
Identity Theft
Flashing
TACACS
20. People very knowledgeable about computers who use their knowledge to invade other people's computers
Hacker
Access Control
Bluejacking
LEAP
21. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
DNS poisoning
Rule Based Access Control
Proximity reader
Vishing
22. Sending high volumes of ICMP (usually ping) packets to a target.
IEEE 802.1x
Word Splitting
Locking Cabinets
ICMP Flood
23. A firewall that can block designated types of traffic from entering a protected network.
Content-Filtering Firewall
Separation of duties
Word Splitting
Trusted OS
24. Computer crimes involving the theft of money
Cyber Theft
Three-Way Handshake
Virus
Bluesnarfing
25. A set of permissions that are attached to an object.
Cipher locks
VPN
Scatternet
ACL
26. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
White Hat
SYN Flood
IEEE 802.1x
Electronic Vandal
27. A form of filtering that blocks only sites specified as harmful.
Backup scope
computer footprint
Human memory
Blacklisting Software
28. A private key and public key
Dumpster Diving
Environmental Threat
Spear Phishing
What is asymmetic encryption?
29. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Fencing
Tailgating
Dwell Time
DNS Hijacking
30. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Distributed storage
Distributed Denial of Service (DDoS)
Password
WEP (Wired Equivalent Privacy)
31. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Scatternet
Swiss Cheese
Backup scope
Environmental Threat
32. An AP that is set up by an attacker.
Evil Twin
Backup scope
Content filtering
Trojan-horse virus
33. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Distributed storage
Standard biometrics
DNS
White Hat
34. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Data
Cyberbullying
computer footprint
Spimming
35. The most restrictive access control model is ____.
Mandatory Access Control
Impersonation
Token
Role Based Access Control
36. A ____ virus infects the Master Boot Record of a hard disk drive.
PAT
CCTV
Packet filtering
Boot
37. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
DNS Hijacking
Vishing
Proximity reader
Physical security access control measures
38. Can also capture transmissions that contain passwords.
OAuth
DNS Hijacking
Hash encoding
Protocol analyzer
39. An attack that forces a user to unintentionally click a link.
ICMP Flood
Clickjacking
Password Crackers
Replay Attack
40. An attacker slips through a secure area following a legitimate employee.
Phishing
Physical security
Spimming
Tailgating
41. These accounts are user accounts that remain active after an employee has left an organization.
Prevention and detection
Orphaned
Firewall logs
Server-Side
42. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Identity Theft
Bluesnarfing
Sniffer
Cyberbullying
43. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Content inspection
Bluesnarfing
Stateless Firewall
Separation of duties
44. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Hoaxes
Chain
Bluesnarfing
EAP
45. A user accessing a computer system must present credentials or ____ when logging on to the system.
Rootkit
Identification
Backup scope
Spimming
46. How secure the data in your backups is-can use physical security or encryption
Bluejacking
Firewalls
Blacklisting Software
Security
47. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Dumpster Diving
Worm
Script Kiddie
Whaling
48. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
ACL
Electronic Activist (hacktivist)
Tailgating
CHAP (Challenge Handshake Authentication Protocol)
49. Using a single authentication credential that is shared across multiple networks.
Loop Protection
Malicious Insiders
Drive-by Download
Identity management
50. A firewall capable of monitoring a data stream from end to end.
Stateful Firewall
Content-Filtering Firewall
Insiders
Port Scanner