SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Shoulder Surfing
Cyberstalking/Harassment
Cyber Theft
Trusted OS
2. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Rainbow Tables
Authentication request
TCP/IP
Fake Antivirus
3. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Environmental Threat
Cloud computing
Speech recognition
Load balancing
4. Web application attacks are considered ____ attacks.
Server-Side
Evil Twin
Bluesnarfing
Shoulder Surfing
5. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Replay Attack
Black Hat
Challenge
Hybird
6. Securing a restricted area by erecting a barrier is called ____.
Fencing
Smurf Attack
Bluesnarfing
Replay
7. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
War Driving
Electronic Vandal
Black Hat
Identification
8. The most restrictive access control model is ____.
Mantrap
Wireless VLANs
Mandatory Access Control
Hoaxes
9. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Chain
Orphaned
Hardware Attack
Malicious code
10. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Mouse Trapping
Identification
DNS Hijacking
Standard biometrics
11. Ensures that messages are not corrupt or tampered with
Vishing
CCTV
Rootkit
Hash encoding
12. A ____ is designed to separate a nonsecured area from a secured area.
Prevention and detection
Bluesnarfing
Mantrap
Distributed storage
13. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
EAP
Identity Theft
Hardware Attack
14. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Authentication request
Sniffer
Content inspection
Spear Phishing
15. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Backup scope
Authorization
LDAP injection
16. Related to the perception - thought process - and understanding of the user.
Evil Twin
Physical security
Electronic Activist (hacktivist)
Cognitive biometrics
17. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Port Scanner
Identity management
Brute Force Attack
Content filtering
18. People very knowledgeable about computers who use their knowledge to invade other people's computers
Hacker
Evil Twin
RADIUS
Cyber Theft
19. The weakness of passwords centers on ____.
Human memory
Flashing
DNS Hijacking
Cognitive biometrics
20. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Stateful Firewall
Challenge
Port Scanner
Brute Force
21. Lock - conduit - card key - video equipment - secured guard
Phishing
Physical security access control measures
Role Based Access Control
Token
22. How many past backups you keep - what you did on your machine etc.
Identity Theft
UDP Flood
History
Zone transfer
23. When DNS servers exchange information among themselves it is known as a ____.
Distributed
Hash encoding
PAT
Zone transfer
24. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Electronic eavesdropping
Electronic Vandal
Cyberbullying
Cracker
25. A user under Role Based Access Control can be assigned only one ____.
Role
Subject
Eavesdropping Attack
Floor Guard
26. A private key and public key
Three-Way Handshake
Rogue
Resident
What is asymmetic encryption?
27. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Bluesnarfing
Bluejacking
Rainbow Tables
DAP
28. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Tailgate sensors
Mandatory Access Control
Rootkit
Rogue
29. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Character
CHAP (Challenge Handshake Authentication Protocol)
Distributed Denial of Service (DDoS)
Digital Certificate
30. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Three-Way Handshake
Challenge
Separation of duties
70
31. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Wireless VLANs
CardSpace
Electronic Activist (hacktivist)
Firewalls
32. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Bluesnarfing
Mouse Trapping
SYN Flood
Bluesnarfing
33. Viruses and worms are said to be self-____.
Replicating
Worm
Electronic Vandal
ICMP Flood
34. Sending high volumes of UDP requests to a target.
UDP Flood
Hoaxes
External Threat
Adware
35. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Operation
Trojan-horse virus
EAP
Worm
36. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
OAuth
Rootkit
Role
RADIUS
37. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Data
Tailgate sensors
Malicious Insiders
Malicious code
38. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
Load balancing
Open Port
Proximity reader
39. A variety of threats such as viruses - worms - and Trojan horses
Malicious code
War Driving
Private
Standard biometrics
40. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Loop Protection
Smurf Attack
UDP Flood
Information security
41. Small electronic devices that change user passwords automatically
Token
Wireless security
Identity management
Floor Guard
42. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Resident
Drive-by Download
Stateless Firewall
Brute Force
43. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Authentication request
Client_Hello
Prevention and detection
44. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Separation of duties
Mantrap
Roller barrier
Identity management
45. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Stateful Firewall
Replicating
Adware
CCTV
46. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
ICMP Flood
Eavesdropping Attack
DLP
Floor Guard
47. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Proximity reader
Malicious code
Subject
Cyberbullying
48. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
computer footprint
Private
Buffer Overflow
GIF Layering
49. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Zone transfer
Extreme Humidity
Geometric variance
Man-made Threat
50. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Standard biometrics
Internal Threat
Clickjacking
Mantrap