SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A set of permissions that are attached to an object.
Stateful Firewall
ACL
Load balancing
TACACS
2. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Brute Force Attack
LDAP injection
Authorization
Hacker
3. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
NAT
Electronic Vandal
Packet tampering
Distributed storage
4. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Clickjacking
Virtualization
Cyberbullying
WEP (Wired Equivalent Privacy)
5. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Wireless security
Orphaned
DNS Hijacking
Hacker
6. An attack that forces a user to unintentionally click a link.
Protocol analyzer
Clickjacking
Hybird
Tailgate sensors
7. Related to the perception - thought process - and understanding of the user.
Fake Antivirus
Spoofing
Cognitive biometrics
Authorization
8. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Insiders
Locking Cabinets
Offline cracking
9. Allows a single access point to service different types of users.
Word Splitting
Hash encoding
ICMP Flood
Wireless VLANs
10. Computer crimes involving the theft of money
Tailgating
Drive-by Download
Chain
Cyber Theft
11. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
VPN
Cybercriminals
Tailgate sensors
Macro
12. Web application attacks are considered ____ attacks.
Open Port
Flashing
Server-Side
RADIUS
13. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Data
Private
Brute Force Attack
White Hat
14. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Password Crackers
Locking Cabinets
RADIUS
Environmental Threat
15. A technique for crashing by sending too much data to the buffer in a comuter's memory
Data
War Driving
Biometrics
Buffer Overflow
16. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Man-made Threat
Virtualization
Hash encoding
Role
17. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
ACL
Proximity reader
DNS
Scatternet
18. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Rogue
Environmental Threat
Mandatory Access Control
Firewalls
19. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Chain
CardSpace
Distributed storage
Hybird
20. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Logic Bomb
Mantrap
DLP
Information security
21. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Honeypot
Tailgating
Virus
Cracker
22. A private key and public key
Extreme Humidity
What is asymmetic encryption?
ACL (Access Control List)
Spyware
23. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
70
Vishing
Mantrap
Roller barrier
24. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Separation of duties
70
Electronic Vandal
Rogue
25. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
CHAP (Challenge Handshake Authentication Protocol)
Media for backups
Hash encoding
ACL (Access Control List)
26. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Honeypot
Federated identity management
Distributed storage
Bluejacking
27. It is able to code and decode data
Dwell Time
Symmetric encryption
Security
Cyberbullying
28. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Electronic eavesdropping
Wireless security
Cognitive biometrics
Data
29. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Insiders
Packet tampering
Chain
Bluesnarfing
30. Password and BioMetric
Smurf Attack
Bluejacking
ACL
Two factor security
31. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Blacklisting Software
Trojan-horse virus
Role Based Access Control
32. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Server-Side
Eavesdropping Attack
Stateful Firewall
Spyware
33. A threat that originates from outside the company. (ex. power failure.)
Phishing
Hybird
External Threat
WEP (Wired Equivalent Privacy)
34. A variety of threats such as viruses - worms - and Trojan horses
Account expiration
Malicious code
Backup frequency
EAP
35. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Cyberbullying
SSO
Chain
ACL
36. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
TCP/IP
Man-in-the-Middle Attack
DMS (Demilitarized Zone)
Cybercriminals
37. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Prevention and detection
Content-Filtering Firewall
Malicious code
Proximity reader
38. Ensures that messages are not corrupt or tampered with
Hacker
Cipher locks
SSO
Hash encoding
39. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Stateful Firewall
Bluesnarfing
GIF Layering
CHAP (Challenge Handshake Authentication Protocol)
40. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Phishing
CHAP (Challenge Handshake Authentication Protocol)
Three-Way Handshake
Backup scope
41. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Media for backups
Wireless security
Buffer Overflow
Cracker
42. A security analysis of the transaction within its approved context.
Distributed
Content inspection
Mandatory Access Control
Replay
43. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
DAP
Content inspection
Swiss Cheese
44. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Trojan-horse virus
Black Hat
Private
Ciphertext
45. Broadcast storms can be prevented with ____.
EAP
DNS
Loop Protection
Black Hat
46. A ____ encrypts all data that is transmitted between the remote device and the network.
VPN
CardSpace
Trojan-horse virus
Extreme temperatures
47. ____ attacks are responsible for half of all malware delivered by Web advertising.
Wireless security
Fake Antivirus
Buffer Overflow
Macro
48. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Drive-by Download
Internal Threat
Evil Twin
SYN Flood
49. It accepts spoken words for input as if they had been typed on the keyboard.
Speech recognition
Cyber Theft
Dumpster Diving
Replay Attack
50. ____ can be prewired for electrical power as well as wired network connections.
Locking Cabinets
CCTV
Whaling
IEEE 802.1x