SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
OAuth
Insiders
UDP Flood
Loop Protection
2. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Replay
Amart card
Rootkit
Impersonation
3. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Man-in-the-Middle Attack
Rootkit
BioMetric devices
Challenge
4. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Fencing
Client_Hello
Rogue
Orphaned
5. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Protocol analyzer
Distributed
Cyberbullying
DAC
6. A user under Role Based Access Control can be assigned only one ____.
Role
CCTV
Identity management
Packet tampering
7. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Media for backups
TACACS
Dumpster Diving
Password Crackers
8. A security analysis of the transaction within its approved context.
Open Port
Internal Threat
Mandatory Access Control
Content inspection
9. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
CCTV
Bluejacking
Access Control
DAP
10. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Port Scanner
Script Kiddie
Ciphertext
Eavesdropping Attack
11. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Security
Natural Threat
Wireless VLANs
Malicious Insiders
12. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Flashing
War Driving
Malicious Insiders
Speech recognition
13. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Rogue
OAuth
Shoulder Surfing
Spyware
14. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Token
Blacklisting Software
Flaming
computer footprint
15. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
ACL (Access Control List)
Worm
Electronic eavesdropping
Trusted OS
16. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Tailgate sensors
Operation
Role Based Access Control
Rootkit
17. A set of permissions that are attached to an object.
Cyberstalking/Harassment
Open Port
ACL
Cyber Theft
18. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Cipher locks
Association request
Rainbow Tables
Roller barrier
19. A technique for crashing by sending too much data to the buffer in a comuter's memory
Reverse proxy
Packet tampering
Extreme Humidity
Buffer Overflow
20. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Hoaxes
Stateless Firewall
Replicating
Zone transfer
21. A ____ is a network set up with intentional vulnerabilities.
Distributed
Honeynet
Role
Media for backups
22. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Proximity reader
Physical security access control measures
Authorization
23. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
History
Cracker
DAC
24. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Hybird
Authentication request
Flashing
DNS
25. The weakness of passwords centers on ____.
Kerberos
Human memory
Buffer Overflow
External Threat
26. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
LDAP injection
Cipher locks
Subject
27. The time it takes for a key to be pressed and then released.
Dwell Time
BioMetric devices
DLP
UDP Flood
28. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Access Control
Electronic eavesdropping
Distributed Denial of Service (DDoS)
SSO
29. Password and BioMetric
Wireless VLANs
Eavesdropping Attack
Two factor security
DMS (Demilitarized Zone)
30. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Distributed storage
Bluesnarfing
Logic Bomb
Cipher locks
31. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
Word Splitting
Insiders
Brute Force Attack
32. People very knowledgeable about computers who use their knowledge to invade other people's computers
Hacker
Whaling
Port Scanner
Testing
33. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Port Scanner
Clickjacking
computer footprint
Flaming
34. A private key and public key
Data
IEEE 802.1x
Replay
What is asymmetic encryption?
35. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Dumpster Diving
Association request
NAT
SYN Flood
36. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Account expiration
Tailgate sensors
Role Based Access Control
Honeypot
37. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Zone transfer
Proximity reader
Man-in-the-Middle Attack
Man-made Threat
38. Broadcast storms can be prevented with ____.
UDP Flood
ACL (Access Control List)
Loop Protection
Open Port
39. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Flashing
DLP
Bluejacking
DAP
40. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
DNS poisoning
Stateful packet filtering
Spoofing
Eavesdropping Attack
41. Ensures that messages are not corrupt or tampered with
Malicious code
Locking Cabinets
Stateful Firewall
Hash encoding
42. Scrambles information into an alternative form that requires a key or password to decrypt the information
Encryption
Identification
Separation of duties
Wireless VLANs
43. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Testing
Hoaxes
DNS Hijacking
Distributed Denial of Service (DDoS)
44. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Social engineering
Cipher locks
Distributed storage
Brute Force Attack
45. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
VPN
Spear Phishing
Insiders
Internal Threat
46. ____ is an image spam that is divided into multiple images.
Amart card
Server-Side
GIF Layering
Standard biometrics
47. Floods a Web site with so many requests for service that it slows down or crashes the site
Floor Guard
Denial of service attack
Hash encoding
Data
48. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Bluesnarfing
Web security gateway
Virtualization
Load balancing
49. Set of rules that allow or deny traffic
Whaling
Packet filtering
Cognitive biometrics
Virus
50. Using a single authentication credential that is shared across multiple networks.
Character
Rogue
Identity management
Account expiration