SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Macro
SYN Flood
PAT
GIF Layering
2. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
LDAP injection
Evil Twin
Replay Attack
Challenge
3. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DAP
Hacker
Identity Theft
Packet filtering
4. Wants to cause as much damage as possible - without a particular target or goal.
Tailgating
Fake Antivirus
Electronic Vandal
Authentication request
5. An AP that is set up by an attacker.
Bluejacking
Evil Twin
Trojan-horse virus
DMS (Demilitarized Zone)
6. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Challenge
CHAP (Challenge Handshake Authentication Protocol)
Shoulder Surfing
Evil Twin
7. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
DNS Log
DNS poisoning
Media for backups
Content-Filtering Firewall
8. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
70
Flashing
External Threat
Content-Filtering Firewall
9. The process of giving someone permission to do or have something
DNS Hijacking
What is asymmetic encryption?
Authorization
Drive-by Download
10. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
DMS (Demilitarized Zone)
Account expiration
Extreme Humidity
Rootkit
11. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Distributed storage
Social engineering
Authorization
LDAP injection
12. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
DAC
WEP (Wired Equivalent Privacy)
Proximity reader
Cloud computing
13. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Brute Force Attack
ICMP Flood
Evil Twin
Swiss Cheese
14. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Boot
Loop Protection
Speech recognition
Adware
15. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Internal Threat
Password Crackers
Adware
Swiss Cheese
16. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
Mandatory Access Control
Rogue
CardSpace
17. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Port Scanner
Logic Bomb
RADIUS
Virus
18. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Chain
Cybercriminals
Data
Security
19. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Two factor security
Wireless security
TACACS
Electronic Vandal
20. A variety of threats such as viruses - worms - and Trojan horses
Web security gateway
Malicious code
Operation
Hoaxes
21. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Stateful Firewall
Natural Threat
Authentication request
Testing
22. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
LDAP injection
LEAP
Three-Way Handshake
23. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Mouse Trapping
Scatternet
Geometric variance
Identity management
24. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Authorization
Phishing
Access Control
Denial of service attack
25. Sending high volumes of UDP requests to a target.
SSO
Man-made Threat
Dumpster Diving
UDP Flood
26. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Prevention and detection
Amart card
War Driving
Offline cracking
27. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
RADIUS
Internal Threat
Protocol analyzer
Mantrap
28. Pretending to be another person.
Worm
Replay Attack
Impersonation
Proximity reader
29. An attacker slips through a secure area following a legitimate employee.
Trusted OS
Tailgating
Rogue
Hash encoding
30. The weakness of passwords centers on ____.
DMS (Demilitarized Zone)
Three-Way Handshake
Boot
Human memory
31. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Smurf Attack
GIF Layering
Port Scanner
DNS Hijacking
32. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Flashing
Roller barrier
Ciphertext
Authentication request
33. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
MPack
Shoulder Surfing
Digital Certificate
Flashing
34. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
ACL (Access Control List)
Root
Extreme Humidity
Denial of service attack
35. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
Separation of duties
Wireless security
Challenge
36. Set of rules that allow or deny traffic
Account expiration
Electronic eavesdropping
VPN
Packet filtering
37. A commonly used technique by pornography sites where a user gets "locked" in a web site.
EAP
Mouse Trapping
Cyberstalking/Harassment
Stateless Firewall
38. ____ attacks are responsible for half of all malware delivered by Web advertising.
Open Port
Cracker
Fake Antivirus
Malicious Insiders
39. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
DMS (Demilitarized Zone)
Insiders
Firewalls
RADIUS
40. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Resident
Black Hat
Data
Distributed storage
41. The most restrictive access control model is ____.
Mandatory Access Control
DNS poisoning
Content inspection
Packet tampering
42. Indicates when an account is no longer active.
computer footprint
Identity management
Account expiration
Web security gateway
43. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
DNS
Eavesdropping Attack
Spimming
Trojan-horse virus
44. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Virtualization
Data
Mantrap
Web security gateway
45. How often you perform your backups (cost-benefit analysis of backing up)
Backup frequency
ACL
DAC
Macro
46. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Floor Guard
Bluejacking
Authorization
Web security gateway
47. A pay-per-use computing model in which customers pay only for the computing resources they need.
Web security gateway
Firewall logs
Virus
Cloud computing
48. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Media for backups
TACACS
Hybird
Cognitive biometrics
49. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Electronic Activist (hacktivist)
TACACS
Kerberos
Wireless VLANs
50. Password and BioMetric
Content-Filtering Firewall
Cyberterrorist
Two factor security
Federated identity management