SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Worm
Encryption
CardSpace
Session hijacking
2. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Stateless Firewall
RADIUS
DAP
Human memory
3. Ensures that messages are not corrupt or tampered with
TACACS
SYN Flood
Insiders
Hash encoding
4. A method for confirming users' identities
Authentication
Bluesnarfing
Distributed Denial of Service (DDoS)
Subject
5. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Role Based Access Control
Flaming
PAT
6. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Cipher locks
Identity Theft
Loop Protection
Content-Filtering Firewall
7. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Man-made Threat
Geometric variance
Vishing
Physical security
8. Requires mutual authentication used for WLAN encryption using Cisco client software.
Challenge
Loop Protection
LEAP
Malicious Insiders
9. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Mandatory Access Control
TACACS
Distributed
Security
10. A set of permissions that are attached to an object.
Subject
Protocol analyzer
Stateful packet filtering
ACL
11. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
RADIUS
Human memory
Roller barrier
12. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
Tailgating
OAuth
Flashing
13. ____ is an image spam that is divided into multiple images.
Distributed
computer footprint
DMS (Demilitarized Zone)
GIF Layering
14. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Cognitive biometrics
Spyware
Association request
Extreme Humidity
15. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Web security gateway
Social engineering
ACL (Access Control List)
Phishing
16. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
DNS Log
LEAP
Scatternet
17. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Two factor security
Server-Side
Natural Threat
MPack
18. Set of rules that allow or deny traffic
70
Load balancing
Packet filtering
Stateless Firewall
19. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
CardSpace
Spyware
Cyberterrorist
Digital Certificate
20. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Firewalls
Extreme temperatures
Adware
Digital Certificate
21. Indicates when an account is no longer active.
VPN
Account expiration
ACL
ACL (Access Control List)
22. A ____ encrypts all data that is transmitted between the remote device and the network.
Content filtering
VPN
Mantrap
Fencing
23. The ____ model is the least restrictive.
Web security gateway
Human memory
Kerberos
DAC
24. Holds the promise of reducing the number of usernames and passwords that users must memorize.
SSO
Locking Cabinets
Authentication request
Word Splitting
25. Often used for managing user access to one or more systems.
Rule Based Access Control
Smurf Attack
White Hat
Honeypot
26. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP Poisoning
Orphaned
Clickjacking
Distributed storage
27. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
CCTV
Dumpster Diving
Identity Theft
Wireless security
28. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Password
Distributed storage
Bluesnarfing
White Hat
29. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
Vishing
Private
Spimming
30. Below 40% or above 50%
Extreme Humidity
ICMP Flood
BioMetric devices
Flashing
31. When organizations use software that filters content to prevent the transmission of unauthorized information
Identification
Content filtering
Ciphertext
Root
32. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Distributed Denial of Service (DDoS)
Ciphertext
Hoaxes
Mandatory Access Control
33. The weakness of passwords centers on ____.
Human memory
Geometric variance
DLP
NAT
34. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
70
Orphaned
TACACS
Spoofing
35. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
UDP Flood
Character
Floor Guard
36. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Role
Vishing
Cracker
Load balancing
37. To create a rainbow table - each ____ begins with an initial password that is encrypted.
ICMP Flood
Chain
Session hijacking
Cloud computing
38. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
OAuth
Replay Attack
CCTV
DNS Log
39. An attack that forces a user to unintentionally click a link.
Clickjacking
Bluesnarfing
Shoulder Surfing
Authentication
40. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
ACL
Digital Certificate
Security
TCP/IP
41. Sending high volumes of ICMP (usually ping) packets to a target.
DNS Log
Testing
WEP (Wired Equivalent Privacy)
ICMP Flood
42. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
DNS
Cyberterrorist
Mandatory Access Control
Firewall logs
43. The action that is taken by the subject over the object is called a ____.
Content inspection
Environmental Threat
Operation
Spoofing
44. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
CHAP (Challenge Handshake Authentication Protocol)
Bluejacking
Virus
Speech recognition
45. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Logic Bomb
Malicious Insiders
Authentication request
Digital Certificate
46. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Challenge
TCP/IP
Identification
47. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Security
Physical security access control measures
Social engineering
OAuth
48. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Firewall logs
Spear Phishing
Packet tampering
Spoofing
49. Password and BioMetric
Content inspection
Two factor security
ARP Poisoning
Stateful Firewall
50. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Environmental Threat
DMS (Demilitarized Zone)
Authorization
PAT