SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Replay Attack
ICMP Flood
Loop Protection
2. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Role Based Access Control
DAP
Standard biometrics
Packet tampering
3. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Standard biometrics
Honeypot
White box
Shoulder Surfing
4. ____ is an image spam that is divided into multiple images.
Cyberbullying
GIF Layering
Proximity reader
Scatternet
5. An attacker motivated by the ideology to attack computer or infrastructure networks.
Content-Filtering Firewall
Security
Denial of service attack
Cyberterrorist
6. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Cipher locks
Authorization
Natural Threat
DMS (Demilitarized Zone)
7. Viruses and worms are said to be self-____.
Password
Logic Bomb
Replicating
Internal Threat
8. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
White box
Challenge
Password
Physical security
9. Content filtering - encryption - firewalls
Dumpster Diving
Prevention and detection
Cyber Theft
Buffer Overflow
10. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
MPack
Kerberos
External Threat
Role
11. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Identification
CardSpace
Tailgate sensors
Spear Phishing
12. Can also capture transmissions that contain passwords.
Protocol analyzer
Separation of duties
Smurf Attack
Replay Attack
13. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Rainbow Tables
Three-Way Handshake
Access Control
Backup scope
14. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Roller barrier
Session hijacking
Drive-by Download
Encryption
15. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Spear Phishing
Biometrics
Subject
Firewall logs
16. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
External Threat
Electronic Activist (hacktivist)
Backup scope
Roller barrier
17. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Private
RADIUS
Man-made Threat
Orphaned
18. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
DNS Log
Black Hat
Password
Script Kiddie
19. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Mandatory Access Control
WEP (Wired Equivalent Privacy)
Loop Protection
Authentication request
20. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Separation of duties
Hoaxes
SSO
Brute Force
21. A firewall capable of monitoring a data stream from end to end.
Tailgating
Stateful Firewall
Shoulder Surfing
Denial of service attack
22. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Resident
Router
Bluejacking
Data
23. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Proximity reader
Social engineering
Environmental Threat
Offline cracking
24. Computer crimes involving the theft of money
Cyberbullying
Locking Cabinets
Cyber Theft
Identity Theft
25. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Brute Force
Two factor security
DMS (Demilitarized Zone)
Locking Cabinets
26. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Bluejacking
Replay
DNS poisoning
Association request
27. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
External Threat
Hardware Attack
Private
28. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Cyber Theft
Electronic Activist (hacktivist)
Character
Reverse proxy
29. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Tailgate sensors
DMS (Demilitarized Zone)
Fake Antivirus
Encryption
30. Web application attacks are considered ____ attacks.
Drive-by Download
TACACS
Server-Side
NAT
31. An attack that forces a user to unintentionally click a link.
Rogue
Clickjacking
Session hijacking
Cracker
32. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
ACL
Roller barrier
External Threat
Kerberos
33. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Role
LDAP injection
Cyberstalking/Harassment
Clickjacking
34. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Identification
Mantrap
Electronic Vandal
35. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Access Control
ARP Poisoning
Trusted OS
CCTV
36. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
Virus
Distributed Denial of Service (DDoS)
Identity management
37. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Impersonation
Sniffer
Trusted OS
Roller barrier
38. Securing a restricted area by erecting a barrier is called ____.
Two factor security
Fencing
Malicious Insiders
Spear Phishing
39. A method for confirming users' identities
Authentication
Drive-by Download
Whaling
DNS Log
40. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Cipher locks
External Threat
DAP
Cracker
41. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Mouse Trapping
BioMetric devices
Role Based Access Control
Spear Phishing
42. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
ICMP Flood
Stateless Firewall
Brute Force Attack
Standard biometrics
43. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Ciphertext
Logic Bomb
Honeypot
Server-Side
44. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Backup frequency
Account expiration
White Hat
ACL (Access Control List)
45. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
PAT
Hardware Attack
Association request
Stateful Firewall
46. Forwards packets across computer networks.
Trusted OS
DAC
Trojan-horse virus
Router
47. The action that is taken by the subject over the object is called a ____.
Impersonation
Operation
SYN Flood
Shoulder Surfing
48. Sifting through a company's garbage to find information to help break into their computers
Shoulder Surfing
Access Control
Dumpster Diving
Backup frequency
49. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Prevention and detection
CardSpace
SYN Flood
Rainbow Tables
50. A ____ attack is similar to a passive man-in-the-middle attack.
Replay
Operation
Phishing
ARP Poisoning