SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Trusted OS
Whaling
White Hat
Cipher locks
2. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
WEP (Wired Equivalent Privacy)
Replay Attack
Rootkit
3. A user under Role Based Access Control can be assigned only one ____.
BioMetric devices
LEAP
Role
Replay Attack
4. A group of piconets in which connections exist between different piconets is called a ____.
Hardware Attack
ARP Poisoning
Amart card
Scatternet
5. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Cognitive biometrics
WEP (Wired Equivalent Privacy)
Authorization
6. The process of giving someone permission to do or have something
Authorization
Cipher locks
Session hijacking
Bluesnarfing
7. Could become a key element in authentication in the future.
Phishing
Virus
Cognitive biometrics
Resident
8. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Security
Stateless Firewall
Blacklisting Software
Biometrics
9. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Distributed Denial of Service (DDoS)
70
Virus
Spoofing
10. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
ICMP Flood
Packet tampering
Man-made Threat
Vishing
11. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Extreme temperatures
Geometric variance
Replay Attack
Impersonation
12. A secret combination of letters - numbers - and/or characters that only the user should know.
Data
Rootkit
Password
Spoofing
13. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Distributed storage
computer footprint
Identity management
Electronic eavesdropping
14. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Identity management
Drive-by Download
Private
Media for backups
15. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Proximity reader
LEAP
Kerberos
Data
16. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Proximity reader
Rainbow Tables
70
Vishing
17. Web application attacks are considered ____ attacks.
Cyberterrorist
Standard biometrics
Server-Side
Human memory
18. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Account expiration
Mantrap
Authentication
Smurf Attack
19. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Standard biometrics
70
Private
OAuth
20. Pretending to be another person.
Character
Impersonation
Fake Antivirus
Sniffer
21. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Internal Threat
Cloud computing
PAT
Black Hat
22. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
GIF Layering
Bluesnarfing
Private
Prevention and detection
23. People very knowledgeable about computers who use their knowledge to invade other people's computers
BioMetric devices
Word Splitting
Hacker
ACL (Access Control List)
24. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Social engineering
Firewall logs
Adware
Honeynet
25. A ____ is a network set up with intentional vulnerabilities.
Flashing
Separation of duties
Blacklisting Software
Honeynet
26. A security analysis of the transaction within its approved context.
Vishing
Cyberbullying
Speech recognition
Content inspection
27. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Character
Content inspection
Honeynet
Chain
28. Viruses and worms are said to be self-____.
Replicating
MPack
GIF Layering
Cyberterrorist
29. A ____ encrypts all data that is transmitted between the remote device and the network.
Kerberos
VPN
Logic Bomb
Black Hat
30. Indicates when an account is no longer active.
Spear Phishing
Insiders
Cracker
Account expiration
31. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Role Based Access Control
Media for backups
Vishing
Router
32. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
70
DAP
Identification
Access Control
33. Sifting through a company's garbage to find information to help break into their computers
Subject
Malicious Insiders
Trusted OS
Dumpster Diving
34. Due to the limitations of online guessing - most password attacks today use ____.
Logic Bomb
Bluejacking
Offline cracking
Spimming
35. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Flaming
Web security gateway
DAP
36. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
SSO
computer footprint
Authentication request
Packet filtering
37. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Geometric variance
CHAP (Challenge Handshake Authentication Protocol)
Cybercriminals
Macro
38. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Resident
Media for backups
Zone transfer
Server-Side
39. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Bluesnarfing
Subject
Role Based Access Control
Bluejacking
40. A means of managing and presenting computer resources by function without regard to their physical layout or location.
TACACS
Virtualization
Cloud computing
Cracker
41. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Wireless VLANs
Stateful packet filtering
GIF Layering
Federated identity management
42. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Roller barrier
Private
Token
Spear Phishing
43. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Challenge
Adware
Replicating
Proximity reader
44. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
ACL (Access Control List)
Standard biometrics
Shoulder Surfing
Firewalls
45. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DAP
Cyber Theft
DNS Hijacking
Hardware Attack
46. A ____ means that the application or service assigned to that port is listening for any instructions.
Man-made Threat
Web security gateway
Open Port
Reverse proxy
47. A private key and public key
What is asymmetic encryption?
Loop Protection
Spoofing
ACL
48. It accepts spoken words for input as if they had been typed on the keyboard.
Speech recognition
LDAP injection
DNS Hijacking
Association request
49. Often used for managing user access to one or more systems.
Physical security
Malicious Insiders
Encryption
Rule Based Access Control
50. The weakness of passwords centers on ____.
Human memory
GIF Layering
Cyberbullying
Wireless VLANs