SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An AP that is set up by an attacker.
Extreme Humidity
Evil Twin
ACL (Access Control List)
GIF Layering
2. A technology that can help to evenly distribute work across a network.
Locking Cabinets
ICMP Flood
Load balancing
Account expiration
3. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Fencing
Reverse proxy
Spear Phishing
CardSpace
4. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Data
Vishing
VPN
SSO
5. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Biometrics
Eavesdropping Attack
Spimming
DMS (Demilitarized Zone)
6. ____ attacks are responsible for half of all malware delivered by Web advertising.
Offline cracking
OAuth
Hacker
Fake Antivirus
7. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Insiders
ACL
Virtualization
MPack
8. It is able to code and decode data
Symmetric encryption
Amart card
Packet filtering
Stateless Firewall
9. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
LEAP
DAP
Physical security
Black Hat
10. How often you perform your backups (cost-benefit analysis of backing up)
Role Based Access Control
DNS Hijacking
Trusted OS
Backup frequency
11. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Amart card
Authentication
Flashing
Script Kiddie
12. A form of filtering that blocks only sites specified as harmful.
Separation of duties
Subject
Blacklisting Software
Spyware
13. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Shoulder Surfing
Natural Threat
Macro
CardSpace
14. Content filtering - encryption - firewalls
Phishing
Prevention and detection
Honeynet
Session hijacking
15. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Backup frequency
Whaling
Media for backups
Natural Threat
16. Below 70 degrees or above 75 degrees
Cloud computing
Extreme temperatures
computer footprint
Role
17. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Authorization
Brute Force Attack
Hybird
Rootkit
18. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
Chain
Dumpster Diving
Eavesdropping Attack
19. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Hardware Attack
DNS Log
Bluejacking
LEAP
20. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
What is asymmetic encryption?
Cyberstalking/Harassment
computer footprint
21. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Hacker
Roller barrier
Load balancing
Biometrics
22. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Load balancing
Hybird
Fencing
Content filtering
23. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
TCP/IP
Wireless security
Malicious Insiders
Cognitive biometrics
24. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
WEP (Wired Equivalent Privacy)
Biometrics
DMS (Demilitarized Zone)
VPN
25. A ____ means that the application or service assigned to that port is listening for any instructions.
Amart card
Open Port
Content filtering
Load balancing
26. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Cyberstalking/Harassment
DNS Hijacking
Tailgate sensors
Bluesnarfing
27. Scrambles information into an alternative form that requires a key or password to decrypt the information
CHAP (Challenge Handshake Authentication Protocol)
Hash encoding
GIF Layering
Encryption
28. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Electronic Activist (hacktivist)
Cracker
Tailgating
29. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Brute Force
OAuth
Offline cracking
Client_Hello
30. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Swiss Cheese
Web security gateway
History
31. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Session hijacking
Amart card
Macro
Backup scope
32. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Speech recognition
Amart card
Cognitive biometrics
33. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Security
Internal Threat
Symmetric encryption
Protocol analyzer
34. Set of rules that allow or deny traffic
Packet filtering
Token
Hardware Attack
Information security
35. Pretending to be another person.
Impersonation
Orphaned
Data
Private
36. Broadcast storms can be prevented with ____.
Loop Protection
Flaming
PAT
Adware
37. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Protocol analyzer
Symmetric encryption
Prevention and detection
Separation of duties
38. How many past backups you keep - what you did on your machine etc.
History
RADIUS
Electronic eavesdropping
OAuth
39. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Encryption
Virus
Role Based Access Control
Hybird
40. Sifting through a company's garbage to find information to help break into their computers
Open Port
Dumpster Diving
Floor Guard
Rule Based Access Control
41. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Session hijacking
Access Control
Rogue
WEP (Wired Equivalent Privacy)
42. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Distributed
Packet tampering
Virus
Password Crackers
43. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Eavesdropping Attack
Backup scope
External Threat
Replay Attack
44. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Prevention and detection
DNS Log
TCP/IP
Proximity reader
45. ____ can be prewired for electrical power as well as wired network connections.
Proximity reader
Extreme Humidity
Cybercriminals
Locking Cabinets
46. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
Port Scanner
Association request
Kerberos
47. A method for confirming users' identities
Replicating
Clickjacking
Mouse Trapping
Authentication
48. Password and BioMetric
Distributed Denial of Service (DDoS)
Wireless VLANs
Speech recognition
Two factor security
49. A technique that allows private IP addresses to be used on the public Internet.
Bluesnarfing
NAT
Spoofing
DAC
50. The process of verifying that your backups actually work
Testing
Packet filtering
Cybercriminals
Access Control
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests