SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small electronic devices that change user passwords automatically
Mouse Trapping
Rainbow Tables
Malicious code
Token
2. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Script Kiddie
Impersonation
Man-in-the-Middle Attack
Ciphertext
3. Below 70 degrees or above 75 degrees
Prevention and detection
Extreme temperatures
DNS Hijacking
Private
4. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
PAT
SSO
Web security gateway
Subject
5. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Black Hat
Packet tampering
Geometric variance
OAuth
6. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Router
IEEE 802.1x
Logic Bomb
Worm
7. These accounts are user accounts that remain active after an employee has left an organization.
Internal Threat
History
Orphaned
Man-in-the-Middle Attack
8. A form of filtering that blocks only sites specified as harmful.
History
Blacklisting Software
Shoulder Surfing
DMS (Demilitarized Zone)
9. A ____ is a network set up with intentional vulnerabilities.
ACL (Access Control List)
Standard biometrics
Zone transfer
Honeynet
10. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Backup scope
Protocol analyzer
Amart card
Standard biometrics
11. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Cracker
Bluesnarfing
DLP
Backup scope
12. How many past backups you keep - what you did on your machine etc.
Spear Phishing
Man-made Threat
Smurf Attack
History
13. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Password Crackers
CHAP (Challenge Handshake Authentication Protocol)
Scatternet
Packet tampering
14. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Role Based Access Control
Reverse proxy
Hybird
Authentication request
15. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
ACL (Access Control List)
Access Control
Security
Client_Hello
16. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Encryption
Sniffer
Resident
computer footprint
17. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Extreme Humidity
Bluejacking
Identity Theft
Word Splitting
18. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Ciphertext
Cloud computing
Macro
Offline cracking
19. ____ can be prewired for electrical power as well as wired network connections.
Replay
Floor Guard
Locking Cabinets
PAT
20. A ____ virus infects the Master Boot Record of a hard disk drive.
Replay Attack
Boot
Character
Mouse Trapping
21. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Private
Cloud computing
Cognitive biometrics
Client_Hello
22. A technique that allows private IP addresses to be used on the public Internet.
NAT
Protocol analyzer
Authentication request
Trojan-horse virus
23. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Geometric variance
Vishing
Web security gateway
Swiss Cheese
24. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
LEAP
Replay Attack
Brute Force Attack
25. Set of rules that allow or deny traffic
Packet filtering
TACACS
Flashing
Electronic Vandal
26. Password and BioMetric
Two factor security
DAC
Evil Twin
Cognitive biometrics
27. Securing a restricted area by erecting a barrier is called ____.
Fencing
Offline cracking
Macro
TACACS
28. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Proximity reader
EAP
History
Amart card
29. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Authorization
Cyberbullying
Shoulder Surfing
Extreme Humidity
30. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Chain
Man-made Threat
Character
Human memory
31. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
DNS
VPN
DAP
32. ____ is an image spam that is divided into multiple images.
History
ACL
GIF Layering
Extreme temperatures
33. People very knowledgeable about computers who use their knowledge to invade other people's computers
Hacker
Sniffer
70
Insiders
34. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Information security
Password
Sniffer
UDP Flood
35. A technology that can help to evenly distribute work across a network.
Load balancing
Spear Phishing
Authorization
Malicious code
36. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Hoaxes
Reverse proxy
Separation of duties
Man-in-the-Middle Attack
37. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
War Driving
White box
Extreme temperatures
Identity Theft
38. Broadcast storms can be prevented with ____.
Media for backups
PAT
Cyberterrorist
Loop Protection
39. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Authentication request
Distributed Denial of Service (DDoS)
Stateless Firewall
War Driving
40. Can create entries in a log for all queries that are received.
Rogue
Standard biometrics
Reverse proxy
DNS Log
41. The most restrictive access control model is ____.
Backup frequency
Honeypot
Mandatory Access Control
Buffer Overflow
42. A firewall that can block designated types of traffic from entering a protected network.
Wireless VLANs
Bluejacking
Content-Filtering Firewall
Malicious Insiders
43. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Cognitive biometrics
DNS
Router
ICMP Flood
44. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Root
Bluesnarfing
Tailgate sensors
Prevention and detection
45. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Honeypot
Digital Certificate
EAP
Macro
46. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Authentication request
Ciphertext
Protocol analyzer
Cracker
47. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Worm
Private
Script Kiddie
Resident
48. Can also capture transmissions that contain passwords.
LDAP injection
Virus
Logic Bomb
Protocol analyzer
49. A threat that originates from outside the company. (ex. power failure.)
Man-in-the-Middle Attack
External Threat
Bluesnarfing
Challenge
50. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DAP
Cracker
Packet tampering
Black Hat