SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Broadcast storms can be prevented with ____.
Loop Protection
Buffer Overflow
Role Based Access Control
Password Crackers
2. The protection of information from accidental or intentional misuse by persons inside or outside an organization
What is asymmetic encryption?
Distributed storage
Separation of duties
Information security
3. Requires mutual authentication used for WLAN encryption using Cisco client software.
Zone transfer
ACL (Access Control List)
LEAP
Natural Threat
4. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Man-made Threat
Open Port
Hash encoding
5. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
External Threat
IEEE 802.1x
Digital Certificate
RADIUS
6. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
IEEE 802.1x
CCTV
White box
Internal Threat
7. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Media for backups
RADIUS
GIF Layering
Protocol analyzer
8. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Cyberstalking/Harassment
Denial of service attack
Port Scanner
Malicious code
9. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Rule Based Access Control
Server-Side
Content-Filtering Firewall
Hybird
10. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Authentication
Account expiration
Identity management
Federated identity management
11. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Dumpster Diving
DAC
Environmental Threat
What is asymmetic encryption?
12. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
CHAP (Challenge Handshake Authentication Protocol)
Spoofing
Speech recognition
Man-in-the-Middle Attack
13. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Mandatory Access Control
Flaming
Trojan-horse virus
Open Port
14. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
Authorization
Digital Certificate
Wireless VLANs
15. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Human memory
Ciphertext
Subject
Challenge
16. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Fake Antivirus
Distributed Denial of Service (DDoS)
Protocol analyzer
Mandatory Access Control
17. The most restrictive access control model is ____.
Access Control
Mandatory Access Control
Authentication
Brute Force Attack
18. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Roller barrier
Content inspection
Worm
Media for backups
19. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Content filtering
Bluesnarfing
RADIUS
DNS poisoning
20. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Drive-by Download
Bluesnarfing
Federated identity management
SYN Flood
21. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
Tailgating
Backup scope
Identification
22. A variety of threats such as viruses - worms - and Trojan horses
Malicious code
Speech recognition
Hacker
Authorization
23. A private key and public key
Ciphertext
Whaling
Mantrap
What is asymmetic encryption?
24. Password and BioMetric
Two factor security
Distributed
Rogue
Password
25. The process of giving someone permission to do or have something
Subject
Replay
Root
Authorization
26. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Man-made Threat
White box
Logic Bomb
Adware
27. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Smurf Attack
DAP
Root
Word Splitting
28. How often you perform your backups (cost-benefit analysis of backing up)
Natural Threat
Brute Force Attack
TCP/IP
Backup frequency
29. Software that can guess passwords
Password Crackers
Script Kiddie
Replicating
Trusted OS
30. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Content-Filtering Firewall
Rule Based Access Control
Bluejacking
ICMP Flood
31. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Spear Phishing
Geometric variance
Hardware Attack
Session hijacking
32. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Orphaned
Loop Protection
Cracker
Scatternet
33. Can create entries in a log for all queries that are received.
Scatternet
Distributed
DNS Log
Spear Phishing
34. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
Honeynet
Extreme Humidity
Offline cracking
35. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Script Kiddie
Locking Cabinets
Stateful packet filtering
Access Control
36. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Hardware Attack
LEAP
Challenge
Wireless security
37. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Association request
Cloud computing
Floor Guard
IEEE 802.1x
38. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Spyware
DMS (Demilitarized Zone)
CHAP (Challenge Handshake Authentication Protocol)
Logic Bomb
39. A secret combination of letters - numbers - and/or characters that only the user should know.
WEP (Wired Equivalent Privacy)
Separation of duties
Zone transfer
Password
40. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Spyware
OAuth
Backup scope
UDP Flood
41. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Hardware Attack
Internal Threat
Proximity reader
Adware
42. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Man-made Threat
Stateless Firewall
Session hijacking
Stateful packet filtering
43. Sending high volumes of ICMP (usually ping) packets to a target.
ICMP Flood
SSO
Packet tampering
Swiss Cheese
44. Users who access a Web server are usually restricted to the ____ directory.
Ciphertext
Extreme Humidity
Root
DNS Hijacking
45. Lock - conduit - card key - video equipment - secured guard
Virtualization
LEAP
Physical security access control measures
Data
46. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Stateless Firewall
Backup scope
Private
47. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Virus
Worm
Dumpster Diving
Orphaned
48. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Backup scope
Vishing
Sniffer
Standard biometrics
49. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Natural Threat
Sniffer
Cybercriminals
Electronic eavesdropping
50. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
ICMP Flood
Denial of service attack
Shoulder Surfing
Rootkit
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests