SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Lock - conduit - card key - video equipment - secured guard
DAP
Access Control
Physical security access control measures
Security
2. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Extreme temperatures
Rule Based Access Control
RADIUS
Man-made Threat
3. Set of rules that allow or deny traffic
War Driving
Packet filtering
Electronic Vandal
Vishing
4. A variety of threats such as viruses - worms - and Trojan horses
Malicious code
Orphaned
Stateless Firewall
Operation
5. A set of permissions that are attached to an object.
Human memory
LDAP injection
ACL
Electronic Vandal
6. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DNS
DAP
Flashing
Backup scope
7. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
MPack
Roller barrier
Mouse Trapping
Ciphertext
8. ____ attacks are responsible for half of all malware delivered by Web advertising.
Content inspection
Cognitive biometrics
Fake Antivirus
Digital Certificate
9. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Protocol analyzer
Cracker
Bluesnarfing
Spyware
10. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
OAuth
White box
Private
GIF Layering
11. It accepts spoken words for input as if they had been typed on the keyboard.
Federated identity management
Speech recognition
Amart card
DNS
12. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
VPN
Blacklisting Software
Internal Threat
Password Crackers
13. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Role Based Access Control
VPN
SYN Flood
NAT
14. Hides inside other software - usually as an attachment or a downloadable file
Identity Theft
Cipher locks
Spyware
Trojan-horse virus
15. Forwards packets across computer networks.
Hash encoding
Fake Antivirus
Router
MPack
16. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Zone transfer
Spoofing
CHAP (Challenge Handshake Authentication Protocol)
Rule Based Access Control
17. An attacker motivated by the ideology to attack computer or infrastructure networks.
Phishing
Cyberterrorist
Protocol analyzer
Chain
18. A threat that originates from outside the company. (ex. power failure.)
Brute Force
Orphaned
External Threat
VPN
19. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Tailgating
Roller barrier
Identity Theft
Malicious code
20. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Rule Based Access Control
Router
Man-made Threat
SYN Flood
21. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
VPN
Firewalls
Honeypot
LEAP
22. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Testing
Impersonation
LDAP injection
Firewalls
23. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Private
DNS Log
Fencing
Mandatory Access Control
24. Allows a single access point to service different types of users.
Wireless VLANs
Man-made Threat
Amart card
Cyber Theft
25. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Eavesdropping Attack
ICMP Flood
Virtualization
Spear Phishing
26. The ____ model is the least restrictive.
Orphaned
DAC
DNS Hijacking
Adware
27. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Script Kiddie
Sniffer
Spimming
Session hijacking
28. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Proximity reader
Stateful packet filtering
Hardware Attack
Federated identity management
29. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Electronic eavesdropping
Stateless Firewall
Swiss Cheese
Hybird
30. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Geometric variance
Wireless security
Spear Phishing
Virus
31. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Session hijacking
Distributed storage
Rootkit
Replicating
32. ____ can be prewired for electrical power as well as wired network connections.
Separation of duties
Locking Cabinets
Bluejacking
Clickjacking
33. An attack that forces a user to unintentionally click a link.
Honeynet
Whaling
Clickjacking
Encryption
34. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Clickjacking
Shoulder Surfing
Subject
Bluesnarfing
35. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Bluesnarfing
Macro
LDAP injection
Insiders
36. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Cipher locks
Replay Attack
Distributed
War Driving
37. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Protocol analyzer
Bluesnarfing
Replay Attack
Authentication request
38. Indicates when an account is no longer active.
Firewall logs
Load balancing
Account expiration
GIF Layering
39. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Vishing
Natural Threat
Electronic eavesdropping
Stateless Firewall
40. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Account expiration
CHAP (Challenge Handshake Authentication Protocol)
Flaming
Honeynet
41. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Loop Protection
Mouse Trapping
CCTV
Geometric variance
42. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Proximity reader
CCTV
Packet tampering
Clickjacking
43. Sifting through a company's garbage to find information to help break into their computers
Dumpster Diving
Firewall logs
Challenge
Amart card
44. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Hash encoding
Firewalls
Kerberos
Cloud computing
45. Requires mutual authentication used for WLAN encryption using Cisco client software.
Fencing
Electronic Vandal
LEAP
CHAP (Challenge Handshake Authentication Protocol)
46. Four interrelated aspects to _________:Access - data - infrastructure - computers
Cipher locks
Offline cracking
Electronic eavesdropping
Physical security
47. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Ciphertext
Content filtering
Chain
Virtualization
48. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Worm
Orphaned
Stateless Firewall
Rule Based Access Control
49. Below 40% or above 50%
Authorization
Dwell Time
DLP
Extreme Humidity
50. Sending high volumes of ICMP (usually ping) packets to a target.
DNS poisoning
ICMP Flood
DNS
Roller barrier
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests