SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows a single access point to service different types of users.
Wireless VLANs
Ciphertext
Tailgating
Token
2. A pay-per-use computing model in which customers pay only for the computing resources they need.
Physical security access control measures
Replicating
Blacklisting Software
Cloud computing
3. Provides a greater degree of security by implementing port-based authentication.
IEEE 802.1x
Chain
Biometrics
Router
4. Can be used to determine whether new IP addresses are attempting to probe the network.
Rootkit
Cracker
Electronic Activist (hacktivist)
Firewall logs
5. When DNS servers exchange information among themselves it is known as a ____.
Zone transfer
Cybercriminals
Speech recognition
Shoulder Surfing
6. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Black Hat
Honeypot
Information security
Extreme Humidity
7. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Malicious code
Cybercriminals
Drive-by Download
CHAP (Challenge Handshake Authentication Protocol)
8. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Drive-by Download
Internal Threat
PAT
Operation
9. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
ACL (Access Control List)
White box
Physical security access control measures
DNS Hijacking
10. A framework for transporting authentication protocols instead of the authentication protocol itself.
LEAP
DNS poisoning
EAP
Testing
11. The time it takes for a key to be pressed and then released.
Worm
Spear Phishing
Dwell Time
Denial of service attack
12. The process of giving someone permission to do or have something
Electronic Vandal
Encryption
Authorization
Token
13. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
Word Splitting
Federated identity management
What is asymmetic encryption?
14. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Encryption
Separation of duties
Hoaxes
Stateful packet filtering
15. The most restrictive access control model is ____.
Mandatory Access Control
Wireless VLANs
What is asymmetic encryption?
ACL (Access Control List)
16. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
VPN
Distributed Denial of Service (DDoS)
Port Scanner
Rule Based Access Control
17. Web application attacks are considered ____ attacks.
Server-Side
Floor Guard
Encryption
Identity management
18. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Trusted OS
Web security gateway
White Hat
Bluesnarfing
19. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Stateful Firewall
Security
Dwell Time
Cyberbullying
20. Using a single authentication credential that is shared across multiple networks.
Identity management
Honeynet
Chain
Replicating
21. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Role Based Access Control
70
Firewall logs
Chain
22. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Man-in-the-Middle Attack
NAT
70
Trusted OS
23. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Data
Chain
Open Port
External Threat
24. How many past backups you keep - what you did on your machine etc.
History
Mandatory Access Control
Cognitive biometrics
Backup scope
25. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Server-Side
Port Scanner
Macro
Private
26. Could become a key element in authentication in the future.
Impersonation
Cognitive biometrics
Human memory
Three-Way Handshake
27. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Honeypot
Router
Proximity reader
28. A technique for crashing by sending too much data to the buffer in a comuter's memory
Buffer Overflow
Packet tampering
Drive-by Download
Amart card
29. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Packet filtering
Rule Based Access Control
Macro
Electronic Vandal
30. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Cipher locks
Wireless VLANs
Man-in-the-Middle Attack
Standard biometrics
31. Scrambles information into an alternative form that requires a key or password to decrypt the information
Electronic eavesdropping
Mantrap
Encryption
Standard biometrics
32. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Media for backups
Stateful packet filtering
Distributed
Digital Certificate
33. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Dumpster Diving
Cipher locks
LEAP
Swiss Cheese
34. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Cipher locks
Rainbow Tables
Proximity reader
DAP
35. A ____ means that the application or service assigned to that port is listening for any instructions.
White Hat
Spear Phishing
SYN Flood
Open Port
36. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Virus
Token
Packet filtering
Insiders
37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Association request
Electronic Activist (hacktivist)
Cyber Theft
Vishing
38. Broadcast storms can be prevented with ____.
Identity Theft
Loop Protection
computer footprint
War Driving
39. Can create entries in a log for all queries that are received.
DNS Log
Protocol analyzer
Mantrap
Whaling
40. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
IEEE 802.1x
Shoulder Surfing
White box
computer footprint
41. An attacker motivated by the ideology to attack computer or infrastructure networks.
Brute Force Attack
Tailgating
Stateful Firewall
Cyberterrorist
42. The action that is taken by the subject over the object is called a ____.
Operation
Protocol analyzer
Amart card
Cipher locks
43. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
70
DNS Log
DNS Hijacking
DMS (Demilitarized Zone)
44. Ensures that messages are not corrupt or tampered with
DNS
Reverse proxy
Hash encoding
Phishing
45. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Cyberstalking/Harassment
Rootkit
Symmetric encryption
ACL (Access Control List)
46. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
War Driving
White box
Cyberstalking/Harassment
47. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Swiss Cheese
Web security gateway
IEEE 802.1x
Media for backups
48. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Sniffer
Word Splitting
Social engineering
49. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Amart card
Extreme Humidity
Authorization
Zone transfer
50. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Cyberstalking/Harassment
NAT
Wireless VLANs
Geometric variance
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests