SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Four interrelated aspects to _________:Access - data - infrastructure - computers
Spimming
SSO
Physical security
ARP Poisoning
2. When DNS servers exchange information among themselves it is known as a ____.
ACL
Zone transfer
ACL (Access Control List)
Man-in-the-Middle Attack
3. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Encryption
Bluesnarfing
Environmental Threat
4. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Load balancing
Phishing
Dwell Time
Digital Certificate
5. Sending high volumes of ICMP (usually ping) packets to a target.
Rootkit
DAP
Spoofing
ICMP Flood
6. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Client_Hello
Password Crackers
Clickjacking
Chain
7. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Encryption
Floor Guard
Challenge
Geometric variance
8. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Macro
computer footprint
TCP/IP
Honeypot
9. Using a single authentication credential that is shared across multiple networks.
OAuth
Kerberos
Drive-by Download
Identity management
10. How many past backups you keep - what you did on your machine etc.
Replay Attack
History
Standard biometrics
White Hat
11. Users who access a Web server are usually restricted to the ____ directory.
Vishing
Root
Kerberos
White box
12. An attacker slips through a secure area following a legitimate employee.
CCTV
Symmetric encryption
Kerberos
Tailgating
13. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Buffer Overflow
Scatternet
DLP
Bluejacking
14. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Distributed storage
Resident
Cognitive biometrics
Challenge
15. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Amart card
War Driving
Worm
Eavesdropping Attack
16. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Kerberos
Cybercriminals
Ciphertext
Cyberstalking/Harassment
17. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Chain
Distributed
Boot
Separation of duties
18. Set of rules that allow or deny traffic
Hardware Attack
TACACS
Packet filtering
TCP/IP
19. A ____ does not serve clients - but instead routes incoming requests to the correct server.
NAT
Rogue
Bluejacking
Reverse proxy
20. The process of verifying that your backups actually work
Prevention and detection
Cipher locks
Testing
Identification
21. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Brute Force Attack
Proximity reader
Subject
Cyber Theft
22. ____ can be prewired for electrical power as well as wired network connections.
Locking Cabinets
Boot
CardSpace
DNS poisoning
23. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
computer footprint
SSO
70
Backup frequency
24. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Cracker
Mandatory Access Control
Swiss Cheese
Web security gateway
25. Sending high volumes of UDP requests to a target.
UDP Flood
Human memory
Firewalls
Rainbow Tables
26. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Rule Based Access Control
Wireless VLANs
Phishing
Client_Hello
27. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Distributed Denial of Service (DDoS)
Internal Threat
Tailgating
Replay Attack
28. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Physical security
Rule Based Access Control
DNS
Packet tampering
29. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Wireless VLANs
Standard biometrics
Role
SSO
30. An AP that is set up by an attacker.
Mantrap
Evil Twin
Standard biometrics
ACL
31. A technique for crashing by sending too much data to the buffer in a comuter's memory
Cloud computing
Virus
Three-Way Handshake
Buffer Overflow
32. Pretending to be another person.
Phishing
Impersonation
Electronic eavesdropping
Scatternet
33. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Token
Shoulder Surfing
ARP Poisoning
LDAP injection
34. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Loop Protection
Human memory
Three-Way Handshake
Hardware Attack
35. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Evil Twin
SSO
Token
36. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Distributed Denial of Service (DDoS)
Security
Bluejacking
Amart card
37. Securing a restricted area by erecting a barrier is called ____.
Fencing
Cognitive biometrics
Cyberterrorist
Brute Force
38. A set of permissions that are attached to an object.
ACL
EAP
Account expiration
UDP Flood
39. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Human memory
Root
Social engineering
Reverse proxy
40. ____ is an image spam that is divided into multiple images.
Worm
Cognitive biometrics
GIF Layering
Eavesdropping Attack
41. A threat that originates from outside the company. (ex. power failure.)
Brute Force Attack
External Threat
OAuth
Symmetric encryption
42. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Security
SSO
Geometric variance
Media for backups
43. A program that is automatically downloaded to your computer without your consent or even your knowledge.
ACL (Access Control List)
Distributed storage
Wireless VLANs
Drive-by Download
44. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Floor Guard
DMS (Demilitarized Zone)
Private
Stateless Firewall
45. The action that is taken by the subject over the object is called a ____.
Smurf Attack
Operation
Spimming
Honeynet
46. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DAP
Firewalls
Bluesnarfing
Drive-by Download
47. Web application attacks are considered ____ attacks.
Server-Side
Replay Attack
Replay
Prevention and detection
48. A method for confirming users' identities
Smurf Attack
Physical security access control measures
Symmetric encryption
Authentication
49. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
LEAP
CardSpace
Rootkit
Ciphertext
50. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
DAC
MPack
Worm
Bluesnarfing
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests