SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Set of rules that allow or deny traffic
Electronic Activist (hacktivist)
DMS (Demilitarized Zone)
Packet filtering
Role
2. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Packet tampering
Bluesnarfing
Distributed Denial of Service (DDoS)
Cipher locks
3. A method for confirming users' identities
Authentication
Floor Guard
computer footprint
Electronic Activist (hacktivist)
4. Indicates when an account is no longer active.
Account expiration
Eavesdropping Attack
White box
EAP
5. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Access Control
Wireless security
WEP (Wired Equivalent Privacy)
Client_Hello
6. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Vishing
Identification
RADIUS
Insiders
7. To create a rainbow table - each ____ begins with an initial password that is encrypted.
DLP
Rogue
Chain
Session hijacking
8. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Role Based Access Control
ARP Poisoning
DAP
Private
9. Users who access a Web server are usually restricted to the ____ directory.
Separation of duties
Root
BioMetric devices
Trusted OS
10. Provides a greater degree of security by implementing port-based authentication.
Password
IEEE 802.1x
Subject
Spyware
11. Can create entries in a log for all queries that are received.
Biometrics
Separation of duties
DNS Log
CCTV
12. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Session hijacking
Man-in-the-Middle Attack
Electronic Vandal
Client_Hello
13. Content filtering - encryption - firewalls
Whaling
EAP
Prevention and detection
Electronic Activist (hacktivist)
14. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Sniffer
Authentication
Mouse Trapping
Rootkit
15. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Dumpster Diving
White box
Internal Threat
computer footprint
16. Scrambles information into an alternative form that requires a key or password to decrypt the information
Encryption
DNS Hijacking
Cognitive biometrics
Content-Filtering Firewall
17. Wants to cause as much damage as possible - without a particular target or goal.
Impersonation
Insiders
LDAP injection
Electronic Vandal
18. Web application attacks are considered ____ attacks.
Replay Attack
Bluejacking
Server-Side
Subject
19. Below 70 degrees or above 75 degrees
DAP
Extreme temperatures
DNS Log
Insiders
20. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Honeynet
Replicating
Operation
Firewalls
21. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Electronic Activist (hacktivist)
Phishing
Proximity reader
Cracker
22. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Stateful Firewall
70
Packet tampering
Password Crackers
23. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Cognitive biometrics
Spyware
Reverse proxy
Cognitive biometrics
24. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Speech recognition
Spimming
White box
Replay
25. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Subject
Blacklisting Software
BioMetric devices
DLP
26. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Hardware Attack
Backup scope
ICMP Flood
Buffer Overflow
27. A group of piconets in which connections exist between different piconets is called a ____.
ACL (Access Control List)
Scatternet
Hash encoding
Buffer Overflow
28. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Dwell Time
Stateful packet filtering
Impersonation
29. A security analysis of the transaction within its approved context.
Physical security
Hash encoding
Adware
Content inspection
30. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Cipher locks
Ciphertext
Bluejacking
Firewalls
31. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Insiders
Floor Guard
What is asymmetic encryption?
Virtualization
32. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Physical security access control measures
Distributed storage
Insiders
Data
33. A pay-per-use computing model in which customers pay only for the computing resources they need.
Operation
DNS
DAC
Cloud computing
34. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
UDP Flood
Human memory
Authorization
35. A threat that originates from outside the company. (ex. power failure.)
External Threat
Electronic eavesdropping
Stateful packet filtering
Environmental Threat
36. ____ can be prewired for electrical power as well as wired network connections.
Locking Cabinets
Roller barrier
Shoulder Surfing
LEAP
37. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Bluesnarfing
Hardware Attack
External Threat
38. A ____ encrypts all data that is transmitted between the remote device and the network.
VPN
Web security gateway
Rainbow Tables
Blacklisting Software
39. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Smurf Attack
Media for backups
Root
EAP
40. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Cracker
Locking Cabinets
ICMP Flood
Separation of duties
41. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
War Driving
Black Hat
Stateful packet filtering
Macro
42. Pretending to be another person.
Subject
Impersonation
Tailgate sensors
TCP/IP
43. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Character
Hoaxes
Private
Loop Protection
44. Sending high volumes of ICMP (usually ping) packets to a target.
ACL
Prevention and detection
ICMP Flood
Hacker
45. Software that can guess passwords
Smurf Attack
Password Crackers
Roller barrier
Spyware
46. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
TACACS
Human memory
Cyber Theft
47. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Boot
Trusted OS
DAC
Spear Phishing
48. The weakness of passwords centers on ____.
Denial of service attack
Human memory
70
Encryption
49. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Operation
Spoofing
Session hijacking
Macro
50. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Password
CardSpace
BioMetric devices
Speech recognition