SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Web security gateway
Rogue
Hybird
Replay
2. An authentication process that involves three steps.
Identity management
Three-Way Handshake
External Threat
Reverse proxy
3. These accounts are user accounts that remain active after an employee has left an organization.
Hybird
Packet filtering
Worm
Orphaned
4. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Information security
Virtualization
Malicious Insiders
Operation
5. Pretending to be another person.
Access Control
Impersonation
Challenge
CardSpace
6. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Ciphertext
Mantrap
Bluejacking
Flashing
7. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Rogue
Identity Theft
Honeypot
Brute Force Attack
8. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Sniffer
NAT
Association request
Wireless security
9. The process of giving someone permission to do or have something
Biometrics
Authorization
Trojan-horse virus
Backup frequency
10. When organizations use software that filters content to prevent the transmission of unauthorized information
Buffer Overflow
Human memory
Physical security
Content filtering
11. Viruses and worms are said to be self-____.
Testing
Replicating
Floor Guard
RADIUS
12. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Cracker
Flaming
Roller barrier
Blacklisting Software
13. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
History
Digital Certificate
Honeypot
MPack
14. A form of filtering that blocks only sites specified as harmful.
Private
Blacklisting Software
Stateful Firewall
Symmetric encryption
15. Below 70 degrees or above 75 degrees
Packet filtering
Adware
Extreme temperatures
Media for backups
16. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Biometrics
TCP/IP
Symmetric encryption
Chain
17. Below 40% or above 50%
Extreme Humidity
Cyberstalking/Harassment
Firewall logs
Electronic eavesdropping
18. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Flaming
VPN
NAT
White box
19. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Malicious code
Virtualization
Phishing
Locking Cabinets
20. Content filtering - encryption - firewalls
Scatternet
Stateful packet filtering
Prevention and detection
Dumpster Diving
21. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
DNS
Stateless Firewall
Content inspection
Worm
22. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
MPack
Spear Phishing
Identity management
Distributed storage
23. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Operation
VPN
ARP Poisoning
24. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Bluesnarfing
History
DMS (Demilitarized Zone)
Loop Protection
25. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Authorization
Subject
Brute Force
Private
26. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Flashing
Bluesnarfing
Content inspection
27. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Stateful packet filtering
TCP/IP
Worm
IEEE 802.1x
28. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Hoaxes
Malicious Insiders
Physical security access control measures
Hash encoding
29. A user under Role Based Access Control can be assigned only one ____.
Digital Certificate
Environmental Threat
Role
Buffer Overflow
30. Securing a restricted area by erecting a barrier is called ____.
Root
Fencing
Identity Theft
CHAP (Challenge Handshake Authentication Protocol)
31. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Cyberstalking/Harassment
DNS poisoning
SSO
WEP (Wired Equivalent Privacy)
32. Users who access a Web server are usually restricted to the ____ directory.
Bluejacking
Mantrap
Denial of service attack
Root
33. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Blacklisting Software
Electronic eavesdropping
Evil Twin
Spoofing
34. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Roller barrier
Buffer Overflow
Cipher locks
NAT
35. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Stateful Firewall
Evil Twin
Bluesnarfing
Fake Antivirus
36. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Eavesdropping Attack
Brute Force
Cyberstalking/Harassment
Replicating
37. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Scatternet
70
computer footprint
Distributed Denial of Service (DDoS)
38. A commonly used technique by pornography sites where a user gets "locked" in a web site.
CHAP (Challenge Handshake Authentication Protocol)
WEP (Wired Equivalent Privacy)
Cyberbullying
Mouse Trapping
39. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Wireless VLANs
Hash encoding
Worm
Clickjacking
40. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
computer footprint
White box
Stateful Firewall
41. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
WEP (Wired Equivalent Privacy)
ACL
ACL (Access Control List)
Chain
42. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Content inspection
Hybird
CHAP (Challenge Handshake Authentication Protocol)
Physical security
43. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Loop Protection
Private
Cyberstalking/Harassment
Protocol analyzer
44. A technique for crashing by sending too much data to the buffer in a comuter's memory
Proximity reader
Orphaned
Buffer Overflow
Biometrics
45. Form of phishing that targets wealthy individuals.
Cyberstalking/Harassment
Wireless security
Whaling
DAP
46. Sending high volumes of ICMP (usually ping) packets to a target.
ICMP Flood
Macro
CHAP (Challenge Handshake Authentication Protocol)
PAT
47. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Password
Separation of duties
Replay
48. Due to the limitations of online guessing - most password attacks today use ____.
Smurf Attack
Offline cracking
DNS Log
Cipher locks
49. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
CardSpace
Flashing
Eavesdropping Attack
SSO
50. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Packet tampering
History
Bluesnarfing
Mandatory Access Control