SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Challenge
TACACS
Stateful Firewall
White Hat
2. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DAP
RADIUS
Ciphertext
Separation of duties
3. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Biometrics
History
Macro
RADIUS
4. Requires mutual authentication used for WLAN encryption using Cisco client software.
LEAP
Evil Twin
LDAP injection
Replay Attack
5. Password and BioMetric
Flaming
Root
Password
Two factor security
6. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
CCTV
Three-Way Handshake
CHAP (Challenge Handshake Authentication Protocol)
Protocol analyzer
7. A set of permissions that are attached to an object.
Two factor security
ACL
Federated identity management
Malicious code
8. A ____ virus infects the Master Boot Record of a hard disk drive.
Boot
Honeynet
Tailgate sensors
Encryption
9. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Bluejacking
Chain
RADIUS
Kerberos
10. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Cracker
Extreme Humidity
Backup scope
11. The process of giving someone permission to do or have something
Stateless Firewall
Authorization
Load balancing
Cybercriminals
12. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
DNS poisoning
Brute Force Attack
Floor Guard
Access Control
13. A ____ does not serve clients - but instead routes incoming requests to the correct server.
IEEE 802.1x
Backup scope
Reverse proxy
SYN Flood
14. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Rootkit
Ciphertext
CardSpace
Authentication request
15. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Association request
Malicious Insiders
Digital Certificate
Firewall logs
16. Scrambles information into an alternative form that requires a key or password to decrypt the information
Information security
Port Scanner
Encryption
ICMP Flood
17. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Role
Virtualization
SSO
Bluesnarfing
18. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Character
Environmental Threat
Two factor security
ACL
19. Below 70 degrees or above 75 degrees
MPack
Fencing
Password
Extreme temperatures
20. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Spear Phishing
Extreme Humidity
Rainbow Tables
Vishing
21. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Clickjacking
Virus
Server-Side
Data
22. The process of verifying that your backups actually work
Identification
Testing
Impersonation
Stateless Firewall
23. Four interrelated aspects to _________:Access - data - infrastructure - computers
Physical security
Cloud computing
Vishing
Insiders
24. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Spimming
Denial of service attack
Packet filtering
Extreme temperatures
25. A form of filtering that blocks only sites specified as harmful.
Session hijacking
Clickjacking
Blacklisting Software
Root
26. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Packet filtering
Honeypot
CCTV
ICMP Flood
27. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Router
Eavesdropping Attack
Mouse Trapping
Logic Bomb
28. Provides a greater degree of security by implementing port-based authentication.
NAT
Security
Phishing
IEEE 802.1x
29. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Fake Antivirus
Malicious Insiders
Floor Guard
LDAP injection
30. ____ can be prewired for electrical power as well as wired network connections.
Content inspection
Locking Cabinets
Flaming
Account expiration
31. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Association request
Human memory
DNS Hijacking
Brute Force
32. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Virus
Cipher locks
Router
Cyberstalking/Harassment
33. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
Two factor security
White box
Firewalls
34. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Extreme temperatures
WEP (Wired Equivalent Privacy)
Account expiration
Federated identity management
35. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Scatternet
DLP
Virus
Separation of duties
36. A ____ is a network set up with intentional vulnerabilities.
Offline cracking
Locking Cabinets
Floor Guard
Honeynet
37. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Password Crackers
Bluejacking
History
Natural Threat
38. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Locking Cabinets
Web security gateway
External Threat
Security
39. A variety of threats such as viruses - worms - and Trojan horses
EAP
Man-made Threat
History
Malicious code
40. Below 40% or above 50%
RADIUS
Drive-by Download
Swiss Cheese
Extreme Humidity
41. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Man-made Threat
Standard biometrics
Flaming
DLP
42. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Man-in-the-Middle Attack
Buffer Overflow
TACACS
Separation of duties
43. Sending high volumes of UDP requests to a target.
UDP Flood
Identity management
Cracker
Bluesnarfing
44. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Physical security
Roller barrier
RADIUS
ACL (Access Control List)
45. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Information security
Identity Theft
Client_Hello
Kerberos
46. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Wireless security
External Threat
Malicious Insiders
Dumpster Diving
47. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Hoaxes
Password Crackers
Physical security
TCP/IP
48. The action that is taken by the subject over the object is called a ____.
SSO
Operation
Distributed
Scatternet
49. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Loop Protection
Malicious code
Smurf Attack
Cognitive biometrics
50. A firewall capable of monitoring a data stream from end to end.
Two factor security
Media for backups
Stateful Firewall
Word Splitting