SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Boot
Virus
Cloud computing
Packet tampering
2. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Insiders
Tailgate sensors
Port Scanner
MPack
3. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Electronic eavesdropping
Clickjacking
Man-made Threat
Ciphertext
4. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Cognitive biometrics
Cipher locks
Clickjacking
Boot
5. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Content filtering
Logic Bomb
Two factor security
Honeypot
6. A ____ is designed to separate a nonsecured area from a secured area.
Mantrap
Black Hat
Man-made Threat
Prevention and detection
7. A variety of threats such as viruses - worms - and Trojan horses
Floor Guard
History
Smurf Attack
Malicious code
8. Password and BioMetric
DAC
Two factor security
Man-made Threat
BioMetric devices
9. An attack that forces a user to unintentionally click a link.
Human memory
Clickjacking
Logic Bomb
IEEE 802.1x
10. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Malicious Insiders
Distributed
Flashing
White Hat
11. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Role
Proximity reader
ACL (Access Control List)
Impersonation
12. Can be used to determine whether new IP addresses are attempting to probe the network.
Spimming
History
Firewall logs
External Threat
13. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Stateful Firewall
Session hijacking
Identity Theft
14. Sending high volumes of ICMP (usually ping) packets to a target.
PAT
ICMP Flood
Denial of service attack
LDAP injection
15. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Two factor security
Mouse Trapping
Authentication request
CHAP (Challenge Handshake Authentication Protocol)
16. Pretending to be another person.
Load balancing
Physical security
Information security
Impersonation
17. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Natural Threat
Separation of duties
Sniffer
Root
18. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Eavesdropping Attack
Electronic Activist (hacktivist)
LDAP injection
Geometric variance
19. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Cyberbullying
Operation
Information security
MPack
20. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Encryption
Router
Proximity reader
Separation of duties
21. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Prevention and detection
Tailgate sensors
Floor Guard
Access Control
22. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
70
Cloud computing
Access Control
Content-Filtering Firewall
23. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Offline cracking
Encryption
Hash encoding
Drive-by Download
24. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
DLP
Orphaned
What is asymmetic encryption?
Role Based Access Control
25. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Content inspection
Dwell Time
Mantrap
Digital Certificate
26. A user accessing a computer system must present credentials or ____ when logging on to the system.
Role
ACL (Access Control List)
Password Crackers
Identification
27. Content filtering - encryption - firewalls
Authorization
Prevention and detection
Spimming
Character
28. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Media for backups
Brute Force
DNS
UDP Flood
29. A technology that can help to evenly distribute work across a network.
Evil Twin
Load balancing
Replicating
Packet tampering
30. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Content-Filtering Firewall
Distributed Denial of Service (DDoS)
Hash encoding
Rainbow Tables
31. Computer crimes involving the theft of money
Geometric variance
Load balancing
Adware
Cyber Theft
32. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Mantrap
Electronic eavesdropping
Word Splitting
33. An authentication process that involves three steps.
Prevention and detection
Separation of duties
Content filtering
Three-Way Handshake
34. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Cyberstalking/Harassment
DNS Hijacking
Locking Cabinets
Speech recognition
35. A group of piconets in which connections exist between different piconets is called a ____.
Scatternet
Human memory
Role Based Access Control
Load balancing
36. The weakness of passwords centers on ____.
Three-Way Handshake
Human memory
Distributed Denial of Service (DDoS)
Shoulder Surfing
37. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Amart card
Client_Hello
Phishing
Biometrics
38. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Rogue
Content inspection
DLP
Protocol analyzer
39. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Trusted OS
Bluesnarfing
Stateful packet filtering
Tailgate sensors
40. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Kerberos
Virus
Hybird
Hacker
41. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Buffer Overflow
Phishing
Hash encoding
Cyberbullying
42. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
What is asymmetic encryption?
Spear Phishing
ARP Poisoning
Trusted OS
43. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Separation of duties
Security
Sniffer
War Driving
44. A secret combination of letters - numbers - and/or characters that only the user should know.
TACACS
NAT
Password
ACL (Access Control List)
45. The most restrictive access control model is ____.
Flaming
Proximity reader
Cyberstalking/Harassment
Mandatory Access Control
46. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
RADIUS
Cognitive biometrics
IEEE 802.1x
Two factor security
47. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Stateful Firewall
Federated identity management
Router
Root
48. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Proximity reader
Spimming
UDP Flood
Port Scanner
49. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Authorization
DLP
Password
Flashing
50. Four interrelated aspects to _________:Access - data - infrastructure - computers
Backup scope
Load balancing
Physical security
CCTV