SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Character
LDAP injection
RADIUS
Testing
2. Software that can guess passwords
Operation
Physical security access control measures
Cyberstalking/Harassment
Password Crackers
3. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
External Threat
RADIUS
Firewalls
Insiders
4. Broadcast storms can be prevented with ____.
Loop Protection
70
Flaming
Natural Threat
5. Sending high volumes of ICMP (usually ping) packets to a target.
Stateful Firewall
DNS
Malicious code
ICMP Flood
6. A ____ is designed to separate a nonsecured area from a secured area.
Virus
Dwell Time
Data
Mantrap
7. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Cyberterrorist
Digital Certificate
Web security gateway
Worm
8. Floods a Web site with so many requests for service that it slows down or crashes the site
computer footprint
Trojan-horse virus
Denial of service attack
Script Kiddie
9. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Distributed storage
Tailgating
What is asymmetic encryption?
Electronic eavesdropping
10. A ____ is a network set up with intentional vulnerabilities.
SYN Flood
Three-Way Handshake
Honeynet
Subject
11. Hides inside other software - usually as an attachment or a downloadable file
Cyberbullying
Identity Theft
Trojan-horse virus
War Driving
12. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP Poisoning
DLP
Access Control
Stateless Firewall
13. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Phishing
Association request
Man-in-the-Middle Attack
What is asymmetic encryption?
14. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
Standard biometrics
Zone transfer
ACL
15. Password and BioMetric
Spoofing
Two factor security
DNS
Web security gateway
16. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
DNS poisoning
Swiss Cheese
Bluesnarfing
ACL (Access Control List)
17. The weakness of passwords centers on ____.
Amart card
Human memory
Spoofing
Dwell Time
18. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Root
Spimming
Offline cracking
Session hijacking
19. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
ACL
Account expiration
Web security gateway
20. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Stateless Firewall
Content inspection
Electronic Activist (hacktivist)
Role Based Access Control
21. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
CCTV
Account expiration
Security
Subject
22. Can create entries in a log for all queries that are received.
Identity Theft
DNS Log
Electronic Activist (hacktivist)
IEEE 802.1x
23. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Insiders
Content-Filtering Firewall
Natural Threat
White Hat
24. Often used for managing user access to one or more systems.
DLP
Operation
Media for backups
Rule Based Access Control
25. Sifting through a company's garbage to find information to help break into their computers
Black Hat
Physical security access control measures
Cognitive biometrics
Dumpster Diving
26. Small electronic devices that change user passwords automatically
Distributed storage
CCTV
Data
Token
27. A technique that allows private IP addresses to be used on the public Internet.
Physical security
Cognitive biometrics
TACACS
NAT
28. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Stateless Firewall
Backup scope
DNS
Authentication request
29. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Port Scanner
Extreme temperatures
Rainbow Tables
Logic Bomb
30. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Encryption
RADIUS
Identity management
Wireless VLANs
31. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Fencing
Cyber Theft
Hardware Attack
Web security gateway
32. Requires mutual authentication used for WLAN encryption using Cisco client software.
LEAP
Whaling
TCP/IP
Orphaned
33. Could become a key element in authentication in the future.
Speech recognition
LEAP
Client_Hello
Cognitive biometrics
34. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Rogue
DNS poisoning
Eavesdropping Attack
NAT
35. A method for confirming users' identities
Information security
Authentication
Bluesnarfing
Social engineering
36. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Proximity reader
Backup scope
Tailgating
Vishing
37. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
NAT
Locking Cabinets
CardSpace
Bluejacking
38. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Information security
Macro
Electronic eavesdropping
Private
39. A secret combination of letters - numbers - and/or characters that only the user should know.
Subject
EAP
Password
Social engineering
40. Using a single authentication credential that is shared across multiple networks.
Identity management
Logic Bomb
Clickjacking
Operation
41. The action that is taken by the subject over the object is called a ____.
Clickjacking
WEP (Wired Equivalent Privacy)
Operation
Character
42. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
ACL
Replicating
Cognitive biometrics
Port Scanner
43. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Firewall logs
Trojan-horse virus
Media for backups
Cracker
44. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Firewalls
Hash encoding
Geometric variance
Rule Based Access Control
45. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
External Threat
RADIUS
Backup frequency
WEP (Wired Equivalent Privacy)
46. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Mandatory Access Control
SYN Flood
Distributed
Cyber Theft
47. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
MPack
Identification
Information security
48. The time it takes for a key to be pressed and then released.
Dwell Time
Cracker
OAuth
Identity Theft
49. A means of managing and presenting computer resources by function without regard to their physical layout or location.
White box
Virtualization
OAuth
Amart card
50. Viruses and worms are said to be self-____.
Replicating
Swiss Cheese
Loop Protection
White Hat