SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Below 40% or above 50%
Operation
Content inspection
Extreme Humidity
TCP/IP
2. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Spyware
Rootkit
Server-Side
Mantrap
3. Related to the perception - thought process - and understanding of the user.
Bluesnarfing
Flashing
Cognitive biometrics
Speech recognition
4. A ____ is designed to separate a nonsecured area from a secured area.
Mantrap
Testing
Character
OAuth
5. The action that is taken by the subject over the object is called a ____.
Shoulder Surfing
Mantrap
Extreme temperatures
Operation
6. Broadcast storms can be prevented with ____.
Loop Protection
Replay
Extreme temperatures
Macro
7. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Password
Electronic Activist (hacktivist)
Chain
Kerberos
8. When organizations use software that filters content to prevent the transmission of unauthorized information
Packet filtering
Geometric variance
Content filtering
Black Hat
9. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Distributed storage
Kerberos
Reverse proxy
Honeynet
10. An attacker slips through a secure area following a legitimate employee.
Trojan-horse virus
Client_Hello
Tailgating
Session hijacking
11. A firewall that can block designated types of traffic from entering a protected network.
Loop Protection
Content-Filtering Firewall
DNS Hijacking
Rogue
12. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Identity Theft
Authorization
Content filtering
Token
13. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Virus
Resident
Extreme Humidity
Two factor security
14. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Distributed storage
Man-made Threat
Hybird
Denial of service attack
15. Could become a key element in authentication in the future.
Cognitive biometrics
Spimming
Flashing
Open Port
16. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Replay
Insiders
Backup frequency
Cognitive biometrics
17. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
White box
Human memory
Script Kiddie
VPN
18. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Cyberstalking/Harassment
History
Server-Side
Internal Threat
19. Using a single authentication credential that is shared across multiple networks.
Identity management
Vishing
Blacklisting Software
UDP Flood
20. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
LEAP
Drive-by Download
OAuth
Amart card
21. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Hacker
SSO
Honeypot
Challenge
22. Four interrelated aspects to _________:Access - data - infrastructure - computers
Virtualization
Authorization
White Hat
Physical security
23. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Spear Phishing
Client_Hello
Script Kiddie
Rainbow Tables
24. Securing a restricted area by erecting a barrier is called ____.
DNS poisoning
Password Crackers
Packet tampering
Fencing
25. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Cyberbullying
Tailgate sensors
Encryption
Private
26. A firewall capable of monitoring a data stream from end to end.
Stateful Firewall
Port Scanner
Macro
Reverse proxy
27. An attack that forces a user to unintentionally click a link.
Cyberterrorist
Testing
DAP
Clickjacking
28. An attack that sends unsolicited messages to Bluetooth-enabled devices.
ICMP Flood
Kerberos
SSO
Bluejacking
29. Ensures that messages are not corrupt or tampered with
TACACS
Spimming
Phishing
Hash encoding
30. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Packet tampering
Buffer Overflow
Distributed Denial of Service (DDoS)
Packet filtering
31. A secret combination of letters - numbers - and/or characters that only the user should know.
Ciphertext
Digital Certificate
Malicious code
Password
32. Wants to cause as much damage as possible - without a particular target or goal.
Offline cracking
Electronic Vandal
Information security
UDP Flood
33. The time it takes for a key to be pressed and then released.
Dwell Time
Rule Based Access Control
Wireless security
Replay
34. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
TCP/IP
ARP Poisoning
Orphaned
Boot
35. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Backup frequency
Clickjacking
Flaming
Biometrics
36. When DNS servers exchange information among themselves it is known as a ____.
ACL (Access Control List)
Insiders
Zone transfer
Cyberstalking/Harassment
37. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Authorization
Whaling
Proximity reader
Geometric variance
38. A threat that originates from outside the company. (ex. power failure.)
Three-Way Handshake
External Threat
Proximity reader
Open Port
39. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Human memory
Shoulder Surfing
Spimming
ACL (Access Control List)
40. An AP that is set up by an attacker.
Phishing
SYN Flood
Evil Twin
Identity management
41. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Replay Attack
Rogue
Spoofing
Cyberbullying
42. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Separation of duties
Prevention and detection
DNS Hijacking
LDAP injection
43. The weakness of passwords centers on ____.
Flaming
Stateful packet filtering
Server-Side
Human memory
44. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Wireless security
SSO
LDAP injection
Shoulder Surfing
45. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Drive-by Download
Rogue
Sniffer
Two factor security
46. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Chain
ACL
Identification
Malicious Insiders
47. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Resident
TCP/IP
Cyberbullying
Buffer Overflow
48. Due to the limitations of online guessing - most password attacks today use ____.
Offline cracking
Bluesnarfing
Open Port
Fencing
49. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Encryption
Authentication
Association request
Separation of duties
50. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Authorization
Spear Phishing
Account expiration
Sniffer