SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
DAC
Geometric variance
Dwell Time
2. The action that is taken by the subject over the object is called a ____.
Content-Filtering Firewall
Operation
Denial of service attack
Amart card
3. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
Shoulder Surfing
Proximity reader
Cyberterrorist
4. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Social engineering
Cyberterrorist
Adware
Bluesnarfing
5. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Brute Force Attack
DNS
Cybercriminals
Spyware
6. Viruses and worms are said to be self-____.
Replicating
Adware
Mantrap
Firewalls
7. Requires mutual authentication used for WLAN encryption using Cisco client software.
LEAP
Geometric variance
Human memory
70
8. Provides a greater degree of security by implementing port-based authentication.
Two factor security
Dumpster Diving
TACACS
IEEE 802.1x
9. It accepts spoken words for input as if they had been typed on the keyboard.
Server-Side
Script Kiddie
Virtualization
Speech recognition
10. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Electronic eavesdropping
Router
Offline cracking
Cipher locks
11. Computer crimes involving the theft of money
Hash encoding
Distributed storage
Bluejacking
Cyber Theft
12. A secret combination of letters - numbers - and/or characters that only the user should know.
White Hat
Port Scanner
Boot
Password
13. ____ is an image spam that is divided into multiple images.
Rootkit
Environmental Threat
Locking Cabinets
GIF Layering
14. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Roller barrier
Malicious Insiders
Hash encoding
LEAP
15. Related to the perception - thought process - and understanding of the user.
Social engineering
White Hat
Cognitive biometrics
Brute Force
16. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Man-made Threat
Hoaxes
Roller barrier
DAP
17. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Root
Man-made Threat
Orphaned
DNS poisoning
18. It is able to code and decode data
Symmetric encryption
ACL
Amart card
Private
19. An attacker motivated by the ideology to attack computer or infrastructure networks.
Character
Fencing
DNS Log
Cyberterrorist
20. Pretending to be another person.
Impersonation
Word Splitting
Replay
Rule Based Access Control
21. A firewall capable of monitoring a data stream from end to end.
Stateful Firewall
Bluesnarfing
Hardware Attack
Identification
22. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
Identification
Access Control
Physical security
23. Can also capture transmissions that contain passwords.
Extreme temperatures
Virus
Protocol analyzer
Content inspection
24. How secure the data in your backups is-can use physical security or encryption
ACL (Access Control List)
Electronic eavesdropping
Rule Based Access Control
Security
25. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Access Control
computer footprint
Sniffer
Phishing
26. Wants to cause as much damage as possible - without a particular target or goal.
Cognitive biometrics
Insiders
Blacklisting Software
Electronic Vandal
27. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
DAC
Content inspection
ICMP Flood
Hoaxes
28. ____ involves horizontally separating words - although it is still readable by the human eye.
Word Splitting
Role
UDP Flood
Physical security access control measures
29. A user accessing a computer system must present credentials or ____ when logging on to the system.
Electronic Vandal
Firewall logs
White Hat
Identification
30. A security analysis of the transaction within its approved context.
Content inspection
Spoofing
Cybercriminals
Cognitive biometrics
31. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Challenge
Virus
DMS (Demilitarized Zone)
Load balancing
32. A method for confirming users' identities
Whaling
Authentication
Physical security
Shoulder Surfing
33. The ____ model is the least restrictive.
Open Port
Distributed
Standard biometrics
DAC
34. A threat that originates from outside the company. (ex. power failure.)
Prevention and detection
External Threat
DLP
Whaling
35. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Man-made Threat
DNS
Blacklisting Software
Session hijacking
36. Form of phishing that targets wealthy individuals.
Whaling
Geometric variance
computer footprint
Bluejacking
37. When DNS servers exchange information among themselves it is known as a ____.
Password
Floor Guard
Zone transfer
Open Port
38. The weakness of passwords centers on ____.
Protocol analyzer
IEEE 802.1x
Human memory
Roller barrier
39. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Extreme Humidity
Brute Force Attack
Stateless Firewall
CardSpace
40. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Trojan-horse virus
Chain
Firewall logs
Environmental Threat
41. Due to the limitations of online guessing - most password attacks today use ____.
Flaming
Content filtering
Port Scanner
Offline cracking
42. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
DLP
White Hat
PAT
Resident
43. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Two factor security
Bluesnarfing
Media for backups
Denial of service attack
44. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
SYN Flood
Stateful packet filtering
Sniffer
Chain
45. An attacker slips through a secure area following a legitimate employee.
Phishing
Identity management
Stateful Firewall
Tailgating
46. An authentication process that involves three steps.
Distributed storage
Geometric variance
Three-Way Handshake
Cyberterrorist
47. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Firewall logs
computer footprint
Black Hat
Environmental Threat
48. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Standard biometrics
Blacklisting Software
OAuth
49. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Cyberbullying
Virus
Logic Bomb
Spimming
50. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Character
Association request
Macro
Geometric variance