SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Physical security access control measures
What is asymmetic encryption?
70
Malicious Insiders
2. When DNS servers exchange information among themselves it is known as a ____.
Load balancing
Logic Bomb
Zone transfer
What is asymmetic encryption?
3. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
CCTV
DAC
Floor Guard
Loop Protection
4. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
PAT
Trusted OS
SSO
Phishing
5. An authentication process that involves three steps.
History
Offline cracking
Ciphertext
Three-Way Handshake
6. Ensures that messages are not corrupt or tampered with
What is asymmetic encryption?
Prevention and detection
Two factor security
Hash encoding
7. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
Spimming
Root
Impersonation
8. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Loop Protection
Role Based Access Control
Media for backups
LDAP injection
9. Indicates when an account is no longer active.
Reverse proxy
Account expiration
Phishing
Subject
10. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Spyware
Distributed Denial of Service (DDoS)
Roller barrier
DAC
11. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
ARP Poisoning
Roller barrier
Spyware
Natural Threat
12. Floods a Web site with so many requests for service that it slows down or crashes the site
Tailgating
SSO
Denial of service attack
Password
13. Password and BioMetric
Physical security access control measures
Tailgating
Two factor security
Reverse proxy
14. A variety of threats such as viruses - worms - and Trojan horses
Cyberbullying
Bluesnarfing
Malicious code
Logic Bomb
15. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Macro
Electronic Vandal
Denial of service attack
Social engineering
16. A ____ encrypts all data that is transmitted between the remote device and the network.
PAT
BioMetric devices
Content filtering
VPN
17. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Buffer Overflow
DLP
Geometric variance
Federated identity management
18. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
ACL (Access Control List)
Logic Bomb
DLP
Load balancing
19. Computer crimes involving the theft of money
Cyber Theft
Virtualization
Black Hat
Virus
20. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
DNS
Cyberbullying
Server-Side
Testing
21. Sending high volumes of UDP requests to a target.
Distributed Denial of Service (DDoS)
Offline cracking
UDP Flood
Smurf Attack
22. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Insiders
Dwell Time
Worm
Replicating
23. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
RADIUS
Malicious code
Spear Phishing
Impersonation
24. A ____ means that the application or service assigned to that port is listening for any instructions.
Testing
Open Port
Extreme Humidity
Distributed Denial of Service (DDoS)
25. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Challenge
DAP
Two factor security
Backup scope
26. Lock - conduit - card key - video equipment - secured guard
Dwell Time
BioMetric devices
Reverse proxy
Physical security access control measures
27. Web application attacks are considered ____ attacks.
Bluesnarfing
White box
ACL
Server-Side
28. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Rootkit
RADIUS
Virus
Role Based Access Control
29. A technique for crashing by sending too much data to the buffer in a comuter's memory
PAT
Buffer Overflow
Port Scanner
Cyberstalking/Harassment
30. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Logic Bomb
Three-Way Handshake
Mouse Trapping
Wireless security
31. Allows a single access point to service different types of users.
TCP/IP
Word Splitting
Wireless VLANs
Kerberos
32. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Security
Flashing
ACL (Access Control List)
Replay
33. A set of permissions that are attached to an object.
ACL
Hybird
Roller barrier
CCTV
34. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Cybercriminals
Whaling
Client_Hello
Blacklisting Software
35. Viruses and worms are said to be self-____.
Replicating
Private
Fencing
Virtualization
36. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
Denial of service attack
Identity management
CCTV
37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Vishing
Hardware Attack
Honeynet
Offline cracking
38. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
Role
Wireless security
Cybercriminals
39. It is able to code and decode data
Man-in-the-Middle Attack
Encryption
PAT
Symmetric encryption
40. An attack that forces a user to unintentionally click a link.
Clickjacking
White Hat
DLP
Cyberbullying
41. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Replay Attack
SSO
Worm
computer footprint
42. An attacker slips through a secure area following a legitimate employee.
Tailgating
Role Based Access Control
Media for backups
Cognitive biometrics
43. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Trusted OS
Worm
Challenge
SYN Flood
44. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Spyware
Password Crackers
Packet tampering
Spimming
45. The most restrictive access control model is ____.
Honeynet
Hoaxes
Mandatory Access Control
Information security
46. Sending high volumes of ICMP (usually ping) packets to a target.
Association request
computer footprint
ICMP Flood
Flaming
47. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
DAC
War Driving
70
Client_Hello
48. A ____ does not serve clients - but instead routes incoming requests to the correct server.
PAT
Identity Theft
Packet filtering
Reverse proxy
49. The process of giving someone permission to do or have something
Hash encoding
Stateful Firewall
Trojan-horse virus
Authorization
50. How secure the data in your backups is-can use physical security or encryption
Security
Physical security
Extreme Humidity
White box