SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Proximity reader
Biometrics
Cybercriminals
Smurf Attack
2. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
OAuth
DLP
Eavesdropping Attack
Authentication
3. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Password Crackers
Chain
Cognitive biometrics
Drive-by Download
4. A framework for transporting authentication protocols instead of the authentication protocol itself.
Phishing
EAP
Physical security access control measures
Replay
5. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Access Control
Spyware
Tailgating
Cognitive biometrics
6. When DNS servers exchange information among themselves it is known as a ____.
Zone transfer
Dumpster Diving
Malicious code
CHAP (Challenge Handshake Authentication Protocol)
7. Below 40% or above 50%
Cyberstalking/Harassment
Password
DMS (Demilitarized Zone)
Extreme Humidity
8. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Adware
Vishing
Flaming
Stateless Firewall
9. A group of piconets in which connections exist between different piconets is called a ____.
Scatternet
Digital Certificate
Character
Drive-by Download
10. Below 70 degrees or above 75 degrees
Extreme temperatures
Root
Content filtering
Phishing
11. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Spoofing
Physical security
Identity Theft
Virus
12. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Standard biometrics
Authentication
Black Hat
Kerberos
13. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Black Hat
Trojan-horse virus
TACACS
Wireless security
14. Fingerprints and patterns
BioMetric devices
Ciphertext
Geometric variance
Distributed Denial of Service (DDoS)
15. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Data
Denial of service attack
Cipher locks
War Driving
16. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Electronic Activist (hacktivist)
Swiss Cheese
ICMP Flood
Insiders
17. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Federated identity management
Bluesnarfing
Swiss Cheese
Cipher locks
18. ____ involves horizontally separating words - although it is still readable by the human eye.
Word Splitting
Spear Phishing
Spoofing
GIF Layering
19. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
NAT
Black Hat
Social engineering
Spimming
20. Broadcast storms can be prevented with ____.
Kerberos
Scatternet
OAuth
Loop Protection
21. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Spimming
Load balancing
Worm
Brute Force
22. ____ can be prewired for electrical power as well as wired network connections.
Packet filtering
Macro
Encryption
Locking Cabinets
23. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Malicious Insiders
Drive-by Download
Stateless Firewall
Logic Bomb
24. Users who access a Web server are usually restricted to the ____ directory.
Root
LEAP
Cognitive biometrics
Content inspection
25. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Distributed
Digital Certificate
Chain
Session hijacking
26. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Biometrics
Separation of duties
Resident
War Driving
27. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Cyberbullying
Boot
Identity Theft
Virtualization
28. The time it takes for a key to be pressed and then released.
Dwell Time
Protocol analyzer
Load balancing
Fake Antivirus
29. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Testing
History
Mouse Trapping
PAT
30. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Media for backups
Word Splitting
Router
UDP Flood
31. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Natural Threat
Identification
Impersonation
Dwell Time
32. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Environmental Threat
Orphaned
Dumpster Diving
33. Software that can guess passwords
Physical security access control measures
DNS poisoning
Password Crackers
Information security
34. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Dwell Time
Vishing
WEP (Wired Equivalent Privacy)
Man-made Threat
35. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Content inspection
Open Port
Honeypot
Replay Attack
36. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Hash encoding
DAP
Proximity reader
Tailgate sensors
37. A variety of threats such as viruses - worms - and Trojan horses
Social engineering
Spyware
Honeypot
Malicious code
38. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
ICMP Flood
computer footprint
Mantrap
Cracker
39. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Extreme Humidity
Spear Phishing
Session hijacking
Drive-by Download
40. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Packet tampering
Whaling
Chain
Mantrap
41. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Distributed storage
Dwell Time
DMS (Demilitarized Zone)
Physical security
42. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Flaming
Spyware
LDAP injection
Protocol analyzer
43. A set of permissions that are attached to an object.
Replicating
Extreme temperatures
Spyware
ACL
44. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Malicious code
Rootkit
Dumpster Diving
Flaming
45. A method for confirming users' identities
Authentication
History
DAP
Spoofing
46. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Digital Certificate
Spimming
Resident
Proximity reader
47. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
ACL (Access Control List)
TACACS
Cyberstalking/Harassment
Virtualization
48. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Fake Antivirus
Roller barrier
Hacker
Firewalls
49. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Character
70
Federated identity management
Fake Antivirus
50. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Man-in-the-Middle Attack
Amart card
Loop Protection
Symmetric encryption