SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Provides a greater degree of security by implementing port-based authentication.
Word Splitting
Wireless VLANs
IEEE 802.1x
History
2. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Loop Protection
What is asymmetic encryption?
Private
Distributed Denial of Service (DDoS)
3. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Authentication
Smurf Attack
Kerberos
Standard biometrics
4. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Firewalls
Bluesnarfing
Fencing
Flaming
5. A threat that originates from outside the company. (ex. power failure.)
EAP
Session hijacking
ACL
External Threat
6. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Biometrics
Swiss Cheese
70
Port Scanner
7. How often you perform your backups (cost-benefit analysis of backing up)
Cognitive biometrics
Spoofing
Backup frequency
Authentication request
8. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Vishing
Man-made Threat
DNS Log
Clickjacking
9. How many past backups you keep - what you did on your machine etc.
History
ICMP Flood
Cognitive biometrics
Scatternet
10. Small electronic devices that change user passwords automatically
Token
External Threat
Proximity reader
BioMetric devices
11. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Fencing
CHAP (Challenge Handshake Authentication Protocol)
70
ARP Poisoning
12. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Black Hat
Honeypot
Authentication
Spear Phishing
13. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Distributed Denial of Service (DDoS)
Eavesdropping Attack
Insiders
ACL
14. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Cracker
Spimming
Sniffer
White box
15. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Bluesnarfing
Dumpster Diving
Virus
Backup scope
16. ____ involves horizontally separating words - although it is still readable by the human eye.
Rainbow Tables
War Driving
DMS (Demilitarized Zone)
Word Splitting
17. Pretending to be another person.
Hoaxes
Authorization
Impersonation
Proximity reader
18. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Smurf Attack
Distributed storage
computer footprint
TACACS
19. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
RADIUS
Digital Certificate
Private
DAP
20. An attacker slips through a secure area following a legitimate employee.
OAuth
Bluesnarfing
Protocol analyzer
Tailgating
21. An AP that is set up by an attacker.
Evil Twin
Hoaxes
Bluesnarfing
Offline cracking
22. A private key and public key
Fencing
What is asymmetic encryption?
LDAP injection
Backup scope
23. Indicates when an account is no longer active.
Account expiration
Mantrap
Human memory
Scatternet
24. A means of managing and presenting computer resources by function without regard to their physical layout or location.
DMS (Demilitarized Zone)
Floor Guard
VPN
Virtualization
25. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
White Hat
Role Based Access Control
Cyberstalking/Harassment
26. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Kerberos
Server-Side
Protocol analyzer
Brute Force Attack
27. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
VPN
Rainbow Tables
Worm
Root
28. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Cyberstalking/Harassment
Honeypot
Packet filtering
29. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Drive-by Download
ACL (Access Control List)
Character
DAP
30. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Brute Force Attack
Rogue
Shoulder Surfing
Symmetric encryption
31. The most restrictive access control model is ____.
GIF Layering
UDP Flood
Human memory
Mandatory Access Control
32. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
PAT
Honeypot
External Threat
TACACS
33. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Human memory
Information security
DNS Log
Replicating
34. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
RADIUS
Open Port
Challenge
Man-in-the-Middle Attack
35. Sifting through a company's garbage to find information to help break into their computers
CardSpace
Dumpster Diving
Challenge
Loop Protection
36. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Federated identity management
70
Client_Hello
Macro
37. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Fake Antivirus
Kerberos
Zone transfer
LDAP injection
38. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
DNS Hijacking
Authorization
Physical security
ACL (Access Control List)
39. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Honeynet
Cipher locks
Natural Threat
Hoaxes
40. A secret combination of letters - numbers - and/or characters that only the user should know.
Cybercriminals
Eavesdropping Attack
Password
Authorization
41. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Challenge
Firewall logs
BioMetric devices
Vishing
42. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Insiders
Digital Certificate
Load balancing
Authentication request
43. A technique for crashing by sending too much data to the buffer in a comuter's memory
Fencing
Buffer Overflow
Account expiration
Worm
44. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Character
SYN Flood
Distributed storage
TACACS
45. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Cognitive biometrics
Kerberos
External Threat
Cyber Theft
46. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Mouse Trapping
Worm
Virtualization
Buffer Overflow
47. Hides inside other software - usually as an attachment or a downloadable file
Content-Filtering Firewall
Separation of duties
Trojan-horse virus
Shoulder Surfing
48. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Hash encoding
Mouse Trapping
Federated identity management
MPack
49. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Spear Phishing
DNS poisoning
Open Port
Reverse proxy
50. Scrambles information into an alternative form that requires a key or password to decrypt the information
Wireless security
Load balancing
Ciphertext
Encryption