SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
SSO
DAC
Testing
2. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Orphaned
Authentication request
Ciphertext
Cognitive biometrics
3. Software that can guess passwords
Password Crackers
Packet tampering
LEAP
DMS (Demilitarized Zone)
4. The process of verifying that your backups actually work
White Hat
Evil Twin
Testing
Wireless security
5. A security analysis of the transaction within its approved context.
Content inspection
DNS Hijacking
What is asymmetic encryption?
Authorization
6. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Flaming
Private
VPN
Protocol analyzer
7. Provides a greater degree of security by implementing port-based authentication.
IEEE 802.1x
Natural Threat
Content-Filtering Firewall
Geometric variance
8. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
White box
Content inspection
Chain
9. The time it takes for a key to be pressed and then released.
Reverse proxy
Dwell Time
Amart card
Resident
10. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
UDP Flood
Electronic eavesdropping
ARP Poisoning
Chain
11. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Malicious code
Stateless Firewall
Script Kiddie
Extreme Humidity
12. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Loop Protection
Replicating
Virtualization
White Hat
13. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Offline cracking
Symmetric encryption
DNS
Man-in-the-Middle Attack
14. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Phishing
Stateful packet filtering
Association request
15. Web application attacks are considered ____ attacks.
Insiders
Server-Side
Geometric variance
Symmetric encryption
16. An attacker slips through a secure area following a legitimate employee.
WEP (Wired Equivalent Privacy)
Tailgating
Authentication request
Fencing
17. Could become a key element in authentication in the future.
Replicating
Cognitive biometrics
Content-Filtering Firewall
Macro
18. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Stateful packet filtering
Role Based Access Control
Cyberbullying
LEAP
19. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Extreme Humidity
Electronic Activist (hacktivist)
Spimming
SYN Flood
20. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Flaming
Association request
Ciphertext
Firewalls
21. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Internal Threat
Smurf Attack
Cognitive biometrics
22. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Hoaxes
Session hijacking
TACACS
CCTV
23. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
BioMetric devices
Phishing
Cyberstalking/Harassment
24. A ____ encrypts all data that is transmitted between the remote device and the network.
Tailgate sensors
VPN
Honeynet
LEAP
25. ____ attacks are responsible for half of all malware delivered by Web advertising.
Challenge
Flaming
Fake Antivirus
Mandatory Access Control
26. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Account expiration
Stateful packet filtering
Chain
Scatternet
27. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
Virtualization
Challenge
GIF Layering
28. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Smurf Attack
Federated identity management
Environmental Threat
GIF Layering
29. Below 70 degrees or above 75 degrees
Man-made Threat
Electronic Activist (hacktivist)
Replay Attack
Extreme temperatures
30. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Shoulder Surfing
Role Based Access Control
Clickjacking
ACL (Access Control List)
31. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Reverse proxy
Hardware Attack
Black Hat
White box
32. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
WEP (Wired Equivalent Privacy)
OAuth
Swiss Cheese
Identity Theft
33. Can also capture transmissions that contain passwords.
Encryption
Session hijacking
LDAP injection
Protocol analyzer
34. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Character
Extreme temperatures
Phishing
35. Can create entries in a log for all queries that are received.
Hoaxes
Evil Twin
History
DNS Log
36. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Cipher locks
Stateful Firewall
Rogue
Three-Way Handshake
37. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
CardSpace
Hardware Attack
Digital Certificate
DNS poisoning
38. Below 40% or above 50%
Cyberstalking/Harassment
Extreme Humidity
IEEE 802.1x
Symmetric encryption
39. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Cybercriminals
Rainbow Tables
Spoofing
Amart card
40. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Identity management
Vishing
Shoulder Surfing
Script Kiddie
41. Users who access a Web server are usually restricted to the ____ directory.
Distributed storage
Man-made Threat
Password Crackers
Root
42. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Mouse Trapping
Ciphertext
Rogue
Cipher locks
43. The weakness of passwords centers on ____.
Backup frequency
Speech recognition
Human memory
Content inspection
44. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Separation of duties
Flaming
Electronic Activist (hacktivist)
WEP (Wired Equivalent Privacy)
45. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
ARP Poisoning
Environmental Threat
Bluesnarfing
Natural Threat
46. Using a single authentication credential that is shared across multiple networks.
Identity management
DNS poisoning
Tailgating
Rogue
47. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Packet filtering
Hash encoding
Rule Based Access Control
DNS Hijacking
48. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
NAT
Spoofing
Physical security
Password Crackers
49. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Biometrics
70
Tailgate sensors
DNS Hijacking
50. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Rainbow Tables
Physical security
Hybird
Biometrics