SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Below 40% or above 50%
Adware
Virtualization
Extreme Humidity
Roller barrier
2. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Electronic Activist (hacktivist)
Encryption
Social engineering
Mandatory Access Control
3. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Data
Rootkit
Rainbow Tables
Dumpster Diving
4. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Natural Threat
Authentication
Bluejacking
Mantrap
5. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Internal Threat
DLP
Scatternet
Hash encoding
6. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Character
Speech recognition
Replay
Brute Force
7. A ____ means that the application or service assigned to that port is listening for any instructions.
Spyware
Open Port
Port Scanner
Roller barrier
8. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Digital Certificate
Spyware
Authorization
Content inspection
9. Using a single authentication credential that is shared across multiple networks.
History
Insiders
Identity management
Proximity reader
10. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Kerberos
Flashing
Whaling
Content inspection
11. People very knowledgeable about computers who use their knowledge to invade other people's computers
ICMP Flood
Tailgate sensors
GIF Layering
Hacker
12. The process of giving someone permission to do or have something
Authorization
Rainbow Tables
Evil Twin
Rule Based Access Control
13. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
CHAP (Challenge Handshake Authentication Protocol)
Character
DNS
Association request
14. Can be used to determine whether new IP addresses are attempting to probe the network.
Standard biometrics
Firewall logs
Biometrics
Sniffer
15. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Loop Protection
ARP Poisoning
Prevention and detection
LEAP
16. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
Token
Extreme Humidity
Brute Force Attack
17. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Bluejacking
Session hijacking
Private
SSO
18. These accounts are user accounts that remain active after an employee has left an organization.
Blacklisting Software
Locking Cabinets
DNS Log
Orphaned
19. A firewall that can block designated types of traffic from entering a protected network.
Web security gateway
Smurf Attack
Eavesdropping Attack
Content-Filtering Firewall
20. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Open Port
Evil Twin
LDAP injection
DNS
21. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Private
Subject
Role Based Access Control
Cipher locks
22. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Flaming
Brute Force
Private
23. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Man-made Threat
Smurf Attack
Electronic eavesdropping
Hoaxes
24. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
ARP Poisoning
Stateful Firewall
Cyber Theft
Cyberstalking/Harassment
25. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Black Hat
PAT
CHAP (Challenge Handshake Authentication Protocol)
Spimming
26. A firewall capable of monitoring a data stream from end to end.
Identity Theft
Zone transfer
Stateful Firewall
Two factor security
27. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Orphaned
Scatternet
Virus
UDP Flood
28. Content filtering - encryption - firewalls
Prevention and detection
Cyberterrorist
Symmetric encryption
Worm
29. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
CHAP (Challenge Handshake Authentication Protocol)
Clickjacking
Cognitive biometrics
Replay Attack
30. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Port Scanner
Subject
Character
TCP/IP
31. A private key and public key
What is asymmetic encryption?
Boot
Scatternet
Cipher locks
32. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Root
Smurf Attack
Virus
33. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Digital Certificate
Script Kiddie
Backup scope
Brute Force
34. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
SSO
Denial of service attack
Spoofing
Malicious Insiders
35. How many past backups you keep - what you did on your machine etc.
Cyberbullying
History
GIF Layering
Character
36. A ____ is designed to separate a nonsecured area from a secured area.
DNS Log
Zone transfer
Sniffer
Mantrap
37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Router
Vishing
Swiss Cheese
Kerberos
38. The process of verifying that your backups actually work
Clickjacking
EAP
White Hat
Testing
39. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
Packet filtering
Speech recognition
History
40. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Physical security
Physical security access control measures
Resident
Port Scanner
41. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Sniffer
Stateful packet filtering
CardSpace
Natural Threat
42. Can create entries in a log for all queries that are received.
DNS Log
Identification
Spimming
Resident
43. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Data
Rootkit
Cyberstalking/Harassment
Impersonation
44. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Spoofing
What is asymmetic encryption?
Drive-by Download
Man-in-the-Middle Attack
45. A form of filtering that blocks only sites specified as harmful.
Digital Certificate
Environmental Threat
ICMP Flood
Blacklisting Software
46. ____ attacks are responsible for half of all malware delivered by Web advertising.
Bluejacking
War Driving
BioMetric devices
Fake Antivirus
47. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Insiders
Web security gateway
Dumpster Diving
Client_Hello
48. Securing a restricted area by erecting a barrier is called ____.
Replicating
Port Scanner
Mandatory Access Control
Fencing
49. Set of rules that allow or deny traffic
Port Scanner
Packet filtering
Firewalls
LEAP
50. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
LDAP injection
Role
OAuth
Scatternet