SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Web application attacks are considered ____ attacks.
DNS
Physical security access control measures
Backup scope
Server-Side
2. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Federated identity management
War Driving
ICMP Flood
3. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Script Kiddie
TACACS
History
Symmetric encryption
4. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
TCP/IP
Content inspection
Virus
5. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
ACL (Access Control List)
Server-Side
Worm
6. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Drive-by Download
Physical security
Cognitive biometrics
Evil Twin
7. ____ attacks are responsible for half of all malware delivered by Web advertising.
Resident
Fake Antivirus
VPN
Human memory
8. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
SYN Flood
Bluejacking
Hash encoding
Cipher locks
9. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Internal Threat
GIF Layering
Port Scanner
WEP (Wired Equivalent Privacy)
10. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Impersonation
Tailgate sensors
DMS (Demilitarized Zone)
Open Port
11. Content filtering - encryption - firewalls
Locking Cabinets
Cyberterrorist
PAT
Prevention and detection
12. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Identification
Fencing
Spimming
Backup frequency
13. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Spear Phishing
Token
Distributed
Locking Cabinets
14. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
MPack
Shoulder Surfing
Tailgating
Eavesdropping Attack
15. How many past backups you keep - what you did on your machine etc.
Kerberos
History
Stateful packet filtering
Cyberterrorist
16. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Wireless VLANs
White box
ARP Poisoning
Brute Force Attack
17. Below 70 degrees or above 75 degrees
White Hat
Malicious Insiders
Spyware
Extreme temperatures
18. Indicates when an account is no longer active.
Account expiration
Physical security access control measures
Separation of duties
Flashing
19. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Client_Hello
Security
Account expiration
Brute Force
20. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
External Threat
Spoofing
Content filtering
Adware
21. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Mantrap
Electronic Activist (hacktivist)
Content filtering
CCTV
22. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Offline cracking
Electronic eavesdropping
Malicious Insiders
Firewall logs
23. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
ACL (Access Control List)
Scatternet
Identity Theft
Fencing
24. People very knowledgeable about computers who use their knowledge to invade other people's computers
Shoulder Surfing
Information security
Vishing
Hacker
25. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Cyberstalking/Harassment
Private
Federated identity management
Malicious code
26. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Tailgate sensors
Stateful packet filtering
Trusted OS
Vishing
27. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
ACL
Port Scanner
ACL (Access Control List)
Electronic eavesdropping
28. Could become a key element in authentication in the future.
Content-Filtering Firewall
ARP Poisoning
Distributed
Cognitive biometrics
29. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Data
Content inspection
Trojan-horse virus
Logic Bomb
30. A method for confirming users' identities
Spimming
Adware
Federated identity management
Authentication
31. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Root
Cipher locks
TCP/IP
Hardware Attack
32. Securing a restricted area by erecting a barrier is called ____.
TACACS
Fencing
Physical security access control measures
Password Crackers
33. Sending high volumes of UDP requests to a target.
Macro
Bluejacking
UDP Flood
Media for backups
34. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Human memory
Session hijacking
Trojan-horse virus
Word Splitting
35. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Script Kiddie
Chain
Virtualization
Encryption
36. An attacker motivated by the ideology to attack computer or infrastructure networks.
Client_Hello
Distributed Denial of Service (DDoS)
Cyberterrorist
Honeypot
37. A threat that originates from outside the company. (ex. power failure.)
Cyberbullying
Ciphertext
SYN Flood
External Threat
38. Computer crimes involving the theft of money
Cognitive biometrics
Federated identity management
Cyber Theft
LEAP
39. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Chain
War Driving
Distributed storage
Subject
40. A secret combination of letters - numbers - and/or characters that only the user should know.
Cognitive biometrics
Password
Two factor security
Cyberbullying
41. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Hardware Attack
Role
Spyware
Authentication request
42. The process of giving someone permission to do or have something
Authorization
Authentication request
Worm
Router
43. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Brute Force
Flaming
Sniffer
Cyberbullying
44. A security analysis of the transaction within its approved context.
Environmental Threat
Content inspection
History
VPN
45. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Load balancing
Sniffer
GIF Layering
Man-made Threat
46. Wants to cause as much damage as possible - without a particular target or goal.
What is asymmetic encryption?
DNS poisoning
Cybercriminals
Electronic Vandal
47. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Internal Threat
Dumpster Diving
Geometric variance
Roller barrier
48. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Identity Theft
Vishing
Phishing
Cipher locks
49. It is able to code and decode data
Buffer Overflow
Electronic Vandal
Dwell Time
Symmetric encryption
50. Pretending to be another person.
Stateful packet filtering
Word Splitting
Fencing
Impersonation