SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Fingerprints and patterns
War Driving
Floor Guard
Cyberbullying
BioMetric devices
2. A set of permissions that are attached to an object.
Mantrap
Orphaned
Flashing
ACL
3. A technique for crashing by sending too much data to the buffer in a comuter's memory
Buffer Overflow
Content filtering
Smurf Attack
Stateful packet filtering
4. An attacker slips through a secure area following a legitimate employee.
Resident
Protocol analyzer
Tailgating
DNS
5. The action that is taken by the subject over the object is called a ____.
Fencing
Association request
DNS Log
Operation
6. Web application attacks are considered ____ attacks.
Honeypot
Server-Side
Human memory
ICMP Flood
7. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Standard biometrics
TCP/IP
Orphaned
White Hat
8. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Smurf Attack
Zone transfer
Script Kiddie
NAT
9. Users who access a Web server are usually restricted to the ____ directory.
Hoaxes
Root
Client_Hello
Spimming
10. The time it takes for a key to be pressed and then released.
WEP (Wired Equivalent Privacy)
Dwell Time
ARP Poisoning
ACL (Access Control List)
11. How often you perform your backups (cost-benefit analysis of backing up)
Authentication request
Content filtering
Backup frequency
DMS (Demilitarized Zone)
12. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Token
Cyberterrorist
Geometric variance
Drive-by Download
13. A ____ is designed to separate a nonsecured area from a secured area.
Mantrap
Cyber Theft
Authentication request
Prevention and detection
14. When DNS servers exchange information among themselves it is known as a ____.
Firewalls
Zone transfer
Bluejacking
Authentication
15. A variety of threats such as viruses - worms - and Trojan horses
CardSpace
Brute Force Attack
Malicious code
Web security gateway
16. Allows a single access point to service different types of users.
Wireless VLANs
Hybird
Worm
Cyberstalking/Harassment
17. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Two factor security
Data
Hybird
Physical security
18. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
EAP
Prevention and detection
Brute Force
19. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
What is asymmetic encryption?
Vishing
Insiders
Ciphertext
20. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
DAC
DAP
Amart card
Phishing
21. Computer crimes involving the theft of money
Cyber Theft
Electronic Activist (hacktivist)
Rogue
BioMetric devices
22. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Tailgate sensors
Wireless VLANs
Hoaxes
Cipher locks
23. ____ is an image spam that is divided into multiple images.
Man-in-the-Middle Attack
Vishing
GIF Layering
Black Hat
24. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
DNS Hijacking
Spoofing
Prevention and detection
Cyberbullying
25. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Malicious Insiders
Chain
Hoaxes
Cracker
26. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
RADIUS
White box
Word Splitting
Offline cracking
27. Lock - conduit - card key - video equipment - secured guard
Rootkit
Physical security
Rogue
Physical security access control measures
28. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
EAP
Swiss Cheese
Biometrics
Content filtering
29. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Macro
Trusted OS
White box
External Threat
30. Sifting through a company's garbage to find information to help break into their computers
Worm
Speech recognition
Dumpster Diving
LEAP
31. Scrambles information into an alternative form that requires a key or password to decrypt the information
Ciphertext
Tailgate sensors
Identity Theft
Encryption
32. It accepts spoken words for input as if they had been typed on the keyboard.
Speech recognition
Security
Boot
Human memory
33. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Replay Attack
Virtualization
Content filtering
Virus
34. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Character
CHAP (Challenge Handshake Authentication Protocol)
Wireless VLANs
Media for backups
35. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Content filtering
Proximity reader
Adware
Standard biometrics
36. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Boot
Information security
Mantrap
Authentication request
37. Related to the perception - thought process - and understanding of the user.
Rule Based Access Control
Physical security access control measures
Cognitive biometrics
Distributed
38. A method for confirming users' identities
Honeypot
Authentication
Distributed
Evil Twin
39. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Content-Filtering Firewall
DNS
Client_Hello
Man-in-the-Middle Attack
40. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Encryption
White box
Spoofing
Roller barrier
41. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Speech recognition
Spear Phishing
Data
42. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Flaming
TCP/IP
Port Scanner
Hoaxes
43. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Brute Force
Packet tampering
Operation
Rootkit
44. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Man-made Threat
Roller barrier
Black Hat
Proximity reader
45. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Hybird
War Driving
Stateless Firewall
Cybercriminals
46. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Hybird
PAT
Distributed
Bluesnarfing
47. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Digital Certificate
Root
DNS poisoning
48. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Distributed Denial of Service (DDoS)
Resident
Bluejacking
ICMP Flood
49. Can also capture transmissions that contain passwords.
Packet tampering
Protocol analyzer
Reverse proxy
Kerberos
50. Below 40% or above 50%
Human memory
MPack
Extreme Humidity
Brute Force