SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Biometrics
Encryption
Reverse proxy
White Hat
2. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Ciphertext
Evil Twin
Wireless security
RADIUS
3. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Bluejacking
Mouse Trapping
Replay Attack
Web security gateway
4. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
SYN Flood
Backup scope
Eavesdropping Attack
5. When DNS servers exchange information among themselves it is known as a ____.
Malicious Insiders
Zone transfer
Natural Threat
Federated identity management
6. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Identification
Separation of duties
Client_Hello
Amart card
7. Can be used to determine whether new IP addresses are attempting to probe the network.
Standard biometrics
70
Account expiration
Firewall logs
8. Wants to cause as much damage as possible - without a particular target or goal.
Proximity reader
ACL (Access Control List)
Password
Electronic Vandal
9. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Separation of duties
White box
DNS
Social engineering
10. Ensures that messages are not corrupt or tampered with
DNS Hijacking
Insiders
Hash encoding
Clickjacking
11. An authentication process that involves three steps.
Mouse Trapping
Three-Way Handshake
Client_Hello
CardSpace
12. Indicates when an account is no longer active.
Account expiration
SYN Flood
DNS Hijacking
Replay
13. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Dumpster Diving
Honeynet
Offline cracking
Adware
14. A technique for crashing by sending too much data to the buffer in a comuter's memory
Mouse Trapping
Buffer Overflow
Root
LEAP
15. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Protocol analyzer
DLP
Dwell Time
DMS (Demilitarized Zone)
16. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Information security
Brute Force
Three-Way Handshake
Operation
17. Forwards packets across computer networks.
Bluejacking
Router
ACL (Access Control List)
Load balancing
18. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Insiders
Man-in-the-Middle Attack
PAT
Three-Way Handshake
19. Broadcast storms can be prevented with ____.
Port Scanner
Symmetric encryption
Loop Protection
Evil Twin
20. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
LEAP
ARP Poisoning
Locking Cabinets
Extreme temperatures
21. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Blacklisting Software
Sniffer
Buffer Overflow
Spear Phishing
22. Set of rules that allow or deny traffic
SYN Flood
Cognitive biometrics
Tailgate sensors
Packet filtering
23. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Sniffer
Identity Theft
Firewalls
Human memory
24. A method for confirming users' identities
Phishing
DNS Hijacking
Testing
Authentication
25. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Testing
Rule Based Access Control
Zone transfer
Man-made Threat
26. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Tailgate sensors
Shoulder Surfing
Token
Black Hat
27. Often used for managing user access to one or more systems.
Floor Guard
Rule Based Access Control
Physical security
Three-Way Handshake
28. Fingerprints and patterns
Rainbow Tables
Electronic eavesdropping
DAP
BioMetric devices
29. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Digital Certificate
Rootkit
Private
Cracker
30. An AP that is set up by an attacker.
Evil Twin
Fencing
Cyber Theft
Bluesnarfing
31. Password and BioMetric
CHAP (Challenge Handshake Authentication Protocol)
Natural Threat
BioMetric devices
Two factor security
32. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Tailgating
Firewalls
Tailgate sensors
Bluejacking
33. It accepts spoken words for input as if they had been typed on the keyboard.
Rogue
Speech recognition
DNS
Load balancing
34. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Wireless security
Flaming
Access Control
Macro
35. A ____ is designed to separate a nonsecured area from a secured area.
Open Port
Mantrap
Insiders
Identity Theft
36. How many past backups you keep - what you did on your machine etc.
Stateless Firewall
Blacklisting Software
CardSpace
History
37. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Swiss Cheese
Vishing
Environmental Threat
ACL (Access Control List)
38. Holds the promise of reducing the number of usernames and passwords that users must memorize.
NAT
Operation
SSO
DNS Log
39. ____ attacks are responsible for half of all malware delivered by Web advertising.
Physical security
Fake Antivirus
TACACS
Packet filtering
40. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
ICMP Flood
Brute Force
SYN Flood
What is asymmetic encryption?
41. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
SSO
Backup scope
Sniffer
Swiss Cheese
42. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Black Hat
Logic Bomb
Macro
Social engineering
43. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Malicious code
Wireless security
Mandatory Access Control
Sniffer
44. Securing a restricted area by erecting a barrier is called ____.
ACL
Fencing
Port Scanner
Hash encoding
45. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Physical security access control measures
Role Based Access Control
Vishing
Spyware
46. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Electronic Activist (hacktivist)
Proximity reader
DNS Hijacking
Fencing
47. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Bluesnarfing
Geometric variance
Cloud computing
Hoaxes
48. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Sniffer
Challenge
Electronic Activist (hacktivist)
Distributed storage
49. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Protocol analyzer
Hoaxes
Distributed storage
50. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
MPack
Firewall logs
Script Kiddie
Distributed
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests