SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Character
ICMP Flood
Denial of service attack
Session hijacking
2. A technology that can help to evenly distribute work across a network.
Identity Theft
Load balancing
Password
Cognitive biometrics
3. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Social engineering
Macro
Blacklisting Software
Trojan-horse virus
4. A security analysis of the transaction within its approved context.
Dumpster Diving
Port Scanner
Identity management
Content inspection
5. Password and BioMetric
Malicious code
Drive-by Download
Two factor security
Root
6. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Reverse proxy
Natural Threat
Rootkit
Cyberbullying
7. How often you perform your backups (cost-benefit analysis of backing up)
Security
Backup frequency
Loop Protection
Identification
8. The process of giving someone permission to do or have something
Human memory
Account expiration
Smurf Attack
Authorization
9. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Floor Guard
Resident
Password Crackers
Dumpster Diving
10. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Eavesdropping Attack
Fake Antivirus
PAT
CardSpace
11. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Mouse Trapping
Bluesnarfing
Adware
Operation
12. ____ involves horizontally separating words - although it is still readable by the human eye.
Word Splitting
Identification
Media for backups
Man-in-the-Middle Attack
13. Sifting through a company's garbage to find information to help break into their computers
Dumpster Diving
Backup frequency
Virus
Content inspection
14. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Logic Bomb
Access Control
Worm
Eavesdropping Attack
15. Securing a restricted area by erecting a barrier is called ____.
Content filtering
Electronic eavesdropping
Cyberstalking/Harassment
Fencing
16. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Open Port
Logic Bomb
Cyberterrorist
Adware
17. How many past backups you keep - what you did on your machine etc.
History
Token
Session hijacking
Dumpster Diving
18. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Virus
Distributed storage
Sniffer
Distributed Denial of Service (DDoS)
19. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Vishing
Password
War Driving
Digital Certificate
20. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Internal Threat
White box
Replicating
Shoulder Surfing
21. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Cyberbullying
Phishing
Floor Guard
Whaling
22. Indicates when an account is no longer active.
Cyberterrorist
Account expiration
Content inspection
Hoaxes
23. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Brute Force
Speech recognition
DLP
Stateless Firewall
24. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Sniffer
Swiss Cheese
Authorization
Electronic Activist (hacktivist)
25. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Dumpster Diving
Firewall logs
CardSpace
VPN
26. Web application attacks are considered ____ attacks.
Mouse Trapping
Server-Side
Script Kiddie
Natural Threat
27. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Cybercriminals
Rogue
Data
Testing
28. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Honeynet
UDP Flood
CHAP (Challenge Handshake Authentication Protocol)
Content filtering
29. An attacker motivated by the ideology to attack computer or infrastructure networks.
Flaming
Cyberbullying
Cyberterrorist
Logic Bomb
30. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
ICMP Flood
Private
Replicating
Tailgate sensors
31. A user under Role Based Access Control can be assigned only one ____.
Client_Hello
External Threat
Role
Flaming
32. A private key and public key
Token
Identity management
Evil Twin
What is asymmetic encryption?
33. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Content inspection
Bluesnarfing
Subject
Content filtering
34. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Natural Threat
Stateful packet filtering
MPack
LDAP injection
35. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Stateful packet filtering
Environmental Threat
Server-Side
Mantrap
36. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Role Based Access Control
Backup frequency
Separation of duties
Spear Phishing
37. A technique for crashing by sending too much data to the buffer in a comuter's memory
VPN
Buffer Overflow
Electronic Activist (hacktivist)
Association request
38. Forwards packets across computer networks.
Macro
Mantrap
Router
Password Crackers
39. Users who access a Web server are usually restricted to the ____ directory.
Insiders
Root
Man-in-the-Middle Attack
Standard biometrics
40. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Shoulder Surfing
computer footprint
Account expiration
Flaming
41. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Sniffer
Web security gateway
Social engineering
Client_Hello
42. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Resident
Rootkit
Social engineering
Challenge
43. Below 70 degrees or above 75 degrees
Extreme temperatures
DMS (Demilitarized Zone)
Malicious code
Whaling
44. Can create entries in a log for all queries that are received.
Cybercriminals
BioMetric devices
DNS Log
Web security gateway
45. An attacker slips through a secure area following a legitimate employee.
EAP
Electronic Activist (hacktivist)
Tailgating
Distributed storage
46. These accounts are user accounts that remain active after an employee has left an organization.
What is asymmetic encryption?
Separation of duties
Orphaned
Black Hat
47. Wants to cause as much damage as possible - without a particular target or goal.
Brute Force
Electronic Vandal
Information security
Insiders
48. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
Electronic Vandal
Symmetric encryption
TCP/IP
49. People very knowledgeable about computers who use their knowledge to invade other people's computers
Offline cracking
Hacker
RADIUS
EAP
50. It is able to code and decode data
Spear Phishing
Physical security
Dwell Time
Symmetric encryption