SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Distributed storage
Rainbow Tables
Virus
Trusted OS
2. When organizations use software that filters content to prevent the transmission of unauthorized information
Character
CHAP (Challenge Handshake Authentication Protocol)
Wireless VLANs
Content filtering
3. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Mouse Trapping
Biometrics
Tailgating
Brute Force Attack
4. Fingerprints and patterns
Tailgating
BioMetric devices
SSO
Content inspection
5. Sending high volumes of ICMP (usually ping) packets to a target.
Logic Bomb
ICMP Flood
Blacklisting Software
Role
6. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Cognitive biometrics
Protocol analyzer
WEP (Wired Equivalent Privacy)
Scatternet
7. Due to the limitations of online guessing - most password attacks today use ____.
DMS (Demilitarized Zone)
Security
Offline cracking
Prevention and detection
8. Sending high volumes of UDP requests to a target.
Cognitive biometrics
UDP Flood
LEAP
Worm
9. A technique for crashing by sending too much data to the buffer in a comuter's memory
Bluejacking
Buffer Overflow
Packet filtering
WEP (Wired Equivalent Privacy)
10. Provides a greater degree of security by implementing port-based authentication.
Cybercriminals
Physical security
IEEE 802.1x
Load balancing
11. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Data
Challenge
Buffer Overflow
BioMetric devices
12. Lock - conduit - card key - video equipment - secured guard
Spyware
Physical security access control measures
TACACS
DMS (Demilitarized Zone)
13. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Malicious Insiders
Electronic Activist (hacktivist)
Offline cracking
Dumpster Diving
14. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Content-Filtering Firewall
Evil Twin
Proximity reader
Media for backups
15. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Adware
Hacker
LEAP
CCTV
16. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
RADIUS
Rogue
Hacker
Script Kiddie
17. ____ involves horizontally separating words - although it is still readable by the human eye.
OAuth
Word Splitting
CHAP (Challenge Handshake Authentication Protocol)
Distributed Denial of Service (DDoS)
18. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Rainbow Tables
Cyberbullying
Speech recognition
Man-in-the-Middle Attack
19. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Denial of service attack
Replay Attack
SSO
Association request
20. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Bluesnarfing
Geometric variance
Private
Rootkit
21. Can create entries in a log for all queries that are received.
DNS Log
Extreme temperatures
Swiss Cheese
History
22. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Operation
SYN Flood
DNS
23. Password and BioMetric
Two factor security
Amart card
Access Control
Denial of service attack
24. People very knowledgeable about computers who use their knowledge to invade other people's computers
Hacker
Data
Prevention and detection
SYN Flood
25. Holds the promise of reducing the number of usernames and passwords that users must memorize.
DNS poisoning
Speech recognition
SSO
Dumpster Diving
26. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Backup scope
Smurf Attack
History
Chain
27. Allows a single access point to service different types of users.
Account expiration
Wireless VLANs
Spyware
Load balancing
28. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Extreme Humidity
Roller barrier
TACACS
Web security gateway
29. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Firewall logs
Cognitive biometrics
Hardware Attack
LEAP
30. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Federated identity management
Phishing
Extreme Humidity
Rainbow Tables
31. A ____ virus infects the Master Boot Record of a hard disk drive.
Content filtering
Content inspection
TCP/IP
Boot
32. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Federated identity management
LDAP injection
Flashing
Man-in-the-Middle Attack
33. A secret combination of letters - numbers - and/or characters that only the user should know.
Biometrics
Password
Open Port
Electronic eavesdropping
34. Users who access a Web server are usually restricted to the ____ directory.
CardSpace
Root
Tailgating
Role Based Access Control
35. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Clickjacking
Mantrap
Distributed storage
DNS
36. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Digital Certificate
Replay
LEAP
Client_Hello
37. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Logic Bomb
SYN Flood
SSO
Packet tampering
38. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Proximity reader
ICMP Flood
PAT
Symmetric encryption
39. Four interrelated aspects to _________:Access - data - infrastructure - computers
IEEE 802.1x
Physical security
Electronic eavesdropping
Trojan-horse virus
40. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Physical security access control measures
Information security
Cognitive biometrics
Chain
41. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Electronic Activist (hacktivist)
Internal Threat
Electronic eavesdropping
MPack
42. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Reverse proxy
Cyber Theft
Encryption
Firewalls
43. Sifting through a company's garbage to find information to help break into their computers
Sniffer
Dumpster Diving
Rogue
Resident
44. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Resident
CHAP (Challenge Handshake Authentication Protocol)
Hoaxes
Data
45. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
OAuth
Private
Identity management
Client_Hello
46. ____ is an image spam that is divided into multiple images.
GIF Layering
Operation
Human memory
Script Kiddie
47. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Flaming
Malicious Insiders
Backup scope
Phishing
48. Broadcast storms can be prevented with ____.
Digital Certificate
Loop Protection
Symmetric encryption
Firewalls
49. An attack that forces a user to unintentionally click a link.
Drive-by Download
Resident
Internal Threat
Clickjacking
50. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Spear Phishing
Rule Based Access Control
Packet tampering
Script Kiddie