SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A method for confirming users' identities
Authentication
Ciphertext
Cracker
Cipher locks
2. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Floor Guard
Tailgating
Information security
Chain
3. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Association request
Packet tampering
Distributed Denial of Service (DDoS)
Subject
4. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Honeynet
DMS (Demilitarized Zone)
Challenge
What is asymmetic encryption?
5. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
DMS (Demilitarized Zone)
Human memory
Sniffer
CardSpace
6. Securing a restricted area by erecting a barrier is called ____.
Tailgate sensors
Fencing
Brute Force
DNS Hijacking
7. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Distributed Denial of Service (DDoS)
DAP
Locking Cabinets
ACL
8. Software that can guess passwords
White box
Password Crackers
Encryption
Three-Way Handshake
9. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Rule Based Access Control
Cognitive biometrics
Offline cracking
OAuth
10. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Script Kiddie
Environmental Threat
Cyberbullying
Resident
11. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Environmental Threat
DMS (Demilitarized Zone)
Hybird
Wireless security
12. The action that is taken by the subject over the object is called a ____.
Operation
Cyber Theft
Hoaxes
Proximity reader
13. Users who access a Web server are usually restricted to the ____ directory.
Honeynet
Dwell Time
Root
Encryption
14. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Adware
Cyberstalking/Harassment
Port Scanner
Physical security
15. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Mouse Trapping
EAP
DNS Hijacking
Social engineering
16. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Hacker
Replay
Digital Certificate
Brute Force Attack
17. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
LEAP
Separation of duties
Man-made Threat
18. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Vishing
Internal Threat
Honeypot
External Threat
19. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
Man-in-the-Middle Attack
Protocol analyzer
Fake Antivirus
20. Four interrelated aspects to _________:Access - data - infrastructure - computers
Clickjacking
EAP
Data
Physical security
21. Allows a single access point to service different types of users.
Distributed
Stateful Firewall
Wireless VLANs
DNS Log
22. A private key and public key
Cracker
What is asymmetic encryption?
Extreme temperatures
Replay
23. Viruses and worms are said to be self-____.
Protocol analyzer
Bluejacking
Whaling
Replicating
24. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Content inspection
Roller barrier
Rainbow Tables
25. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Stateful packet filtering
Natural Threat
ACL (Access Control List)
DNS Hijacking
26. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Server-Side
Shoulder Surfing
Flaming
Challenge
27. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Adware
Private
WEP (Wired Equivalent Privacy)
Bluejacking
28. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Reverse proxy
Malicious Insiders
Distributed storage
Standard biometrics
29. A commonly used technique by pornography sites where a user gets "locked" in a web site.
BioMetric devices
Session hijacking
Mouse Trapping
Bluesnarfing
30. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Server-Side
DNS poisoning
Reverse proxy
Electronic Activist (hacktivist)
31. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Macro
Adware
Smurf Attack
Spear Phishing
32. It accepts spoken words for input as if they had been typed on the keyboard.
Server-Side
Replay Attack
70
Speech recognition
33. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Reverse proxy
Denial of service attack
Challenge
Cipher locks
34. Often used for managing user access to one or more systems.
70
Rule Based Access Control
Evil Twin
Hardware Attack
35. A technique for crashing by sending too much data to the buffer in a comuter's memory
Buffer Overflow
Authorization
Trojan-horse virus
Firewalls
36. The weakness of passwords centers on ____.
Tailgating
Authorization
Human memory
Cyber Theft
37. Scrambles information into an alternative form that requires a key or password to decrypt the information
UDP Flood
Encryption
Hoaxes
Mandatory Access Control
38. ____ is an image spam that is divided into multiple images.
GIF Layering
DMS (Demilitarized Zone)
Role
DNS Log
39. Ensures that messages are not corrupt or tampered with
Hash encoding
Protocol analyzer
Reverse proxy
RADIUS
40. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
Resident
IEEE 802.1x
Dwell Time
41. A secret combination of letters - numbers - and/or characters that only the user should know.
Cyberbullying
Password
Distributed Denial of Service (DDoS)
Three-Way Handshake
42. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Password
Replay Attack
Fencing
Trojan-horse virus
43. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
ACL (Access Control List)
Boot
Man-in-the-Middle Attack
Script Kiddie
44. When DNS servers exchange information among themselves it is known as a ____.
Zone transfer
Cybercriminals
Stateless Firewall
Sniffer
45. A set of permissions that are attached to an object.
ACL (Access Control List)
Flaming
Brute Force Attack
ACL
46. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Cipher locks
ARP Poisoning
Reverse proxy
Spear Phishing
47. Set of rules that allow or deny traffic
Packet filtering
computer footprint
Floor Guard
Protocol analyzer
48. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Load balancing
Logic Bomb
Separation of duties
49. A technology that can help to evenly distribute work across a network.
Zone transfer
TCP/IP
Load balancing
Firewall logs
50. An authentication process that involves three steps.
Three-Way Handshake
Insiders
Wireless VLANs
Media for backups
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests