SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Cybercriminals
Phishing
Distributed
Resident
2. Broadcast storms can be prevented with ____.
Port Scanner
Loop Protection
Amart card
Human memory
3. When DNS servers exchange information among themselves it is known as a ____.
Cyberbullying
Two factor security
Zone transfer
History
4. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Impersonation
Vishing
TACACS
Spear Phishing
5. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Wireless VLANs
Character
Flashing
Virus
6. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Spoofing
Standard biometrics
Insiders
Sniffer
7. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cyberbullying
Content inspection
DNS
DNS poisoning
8. An attacker motivated by the ideology to attack computer or infrastructure networks.
Logic Bomb
Cyberterrorist
Security
Password Crackers
9. Can also capture transmissions that contain passwords.
Cognitive biometrics
DNS poisoning
Hoaxes
Protocol analyzer
10. A variety of threats such as viruses - worms - and Trojan horses
Malicious code
Web security gateway
Zone transfer
Phishing
11. People very knowledgeable about computers who use their knowledge to invade other people's computers
Geometric variance
Media for backups
Security
Hacker
12. A ____ virus infects the Master Boot Record of a hard disk drive.
Spyware
Boot
Distributed Denial of Service (DDoS)
DLP
13. Password and BioMetric
Two factor security
Load balancing
Content inspection
What is asymmetic encryption?
14. A technique for crashing by sending too much data to the buffer in a comuter's memory
Account expiration
Separation of duties
Spimming
Buffer Overflow
15. Could become a key element in authentication in the future.
Cognitive biometrics
Hardware Attack
Clickjacking
History
16. Allows a single access point to service different types of users.
Subject
Wireless VLANs
Electronic Activist (hacktivist)
Role
17. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
DMS (Demilitarized Zone)
Swiss Cheese
Spoofing
Firewalls
18. How often you perform your backups (cost-benefit analysis of backing up)
Router
Buffer Overflow
What is asymmetic encryption?
Backup frequency
19. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Symmetric encryption
Firewalls
RADIUS
20. A form of filtering that blocks only sites specified as harmful.
Cognitive biometrics
Blacklisting Software
Eavesdropping Attack
Password Crackers
21. A set of permissions that are attached to an object.
Account expiration
DAC
Open Port
ACL
22. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
ACL
Testing
Federated identity management
Sniffer
23. Four interrelated aspects to _________:Access - data - infrastructure - computers
Router
Cognitive biometrics
Physical security access control measures
Physical security
24. A technique that allows private IP addresses to be used on the public Internet.
Spear Phishing
Buffer Overflow
NAT
Hybird
25. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
Adware
Biometrics
ICMP Flood
26. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Stateful Firewall
Cyberterrorist
Rootkit
Wireless VLANs
27. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Cracker
Subject
Insiders
Blacklisting Software
28. Sending high volumes of UDP requests to a target.
Spear Phishing
UDP Flood
Honeynet
Phishing
29. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Natural Threat
70
War Driving
Packet tampering
30. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Bluejacking
Man-in-the-Middle Attack
Denial of service attack
Bluesnarfing
31. A ____ encrypts all data that is transmitted between the remote device and the network.
Identification
VPN
Logic Bomb
Blacklisting Software
32. Wants to cause as much damage as possible - without a particular target or goal.
Brute Force Attack
Electronic Vandal
Two factor security
Open Port
33. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Challenge
CCTV
Malicious code
DNS Hijacking
34. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Insiders
Role Based Access Control
Social engineering
Firewalls
35. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Kerberos
UDP Flood
DNS poisoning
OAuth
36. Using a single authentication credential that is shared across multiple networks.
Web security gateway
Extreme Humidity
Dumpster Diving
Identity management
37. A firewall that can block designated types of traffic from entering a protected network.
Content-Filtering Firewall
ACL
Web security gateway
Tailgate sensors
38. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Port Scanner
Packet tampering
Drive-by Download
Macro
39. Small electronic devices that change user passwords automatically
Information security
Association request
Hybird
Token
40. Hides inside other software - usually as an attachment or a downloadable file
Wireless VLANs
Trojan-horse virus
Hardware Attack
Virus
41. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Eavesdropping Attack
IEEE 802.1x
Authorization
Smurf Attack
42. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Physical security
Roller barrier
Clickjacking
Virus
43. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Authentication request
Internal Threat
Bluejacking
Bluesnarfing
44. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Cybercriminals
Testing
Black Hat
Electronic Activist (hacktivist)
45. Sifting through a company's garbage to find information to help break into their computers
Dwell Time
Dumpster Diving
Geometric variance
Server-Side
46. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
BioMetric devices
LEAP
Brute Force Attack
Environmental Threat
47. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Swiss Cheese
White Hat
Character
Stateless Firewall
48. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Shoulder Surfing
Packet filtering
Token
Hacker
49. Fingerprints and patterns
BioMetric devices
Human memory
DNS poisoning
Access Control
50. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Electronic eavesdropping
Distributed
Phishing
Hash encoding