SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Word Splitting
Adware
Phishing
Biometrics
2. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Backup scope
Port Scanner
Identification
computer footprint
3. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Whaling
PAT
Roller barrier
Offline cracking
4. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Flashing
SYN Flood
Replay Attack
Electronic Activist (hacktivist)
5. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
What is asymmetic encryption?
Open Port
Electronic eavesdropping
6. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Backup frequency
Tailgate sensors
DNS
Brute Force Attack
7. Can be used to determine whether new IP addresses are attempting to probe the network.
Shoulder Surfing
Human memory
Logic Bomb
Firewall logs
8. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Data
Speech recognition
Tailgating
Bluesnarfing
9. Indicates when an account is no longer active.
History
WEP (Wired Equivalent Privacy)
Stateful Firewall
Account expiration
10. ____ involves horizontally separating words - although it is still readable by the human eye.
Word Splitting
Identification
Environmental Threat
CHAP (Challenge Handshake Authentication Protocol)
11. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Malicious code
Eavesdropping Attack
ARP Poisoning
Stateless Firewall
12. It accepts spoken words for input as if they had been typed on the keyboard.
Speech recognition
Proximity reader
Swiss Cheese
Distributed storage
13. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Biometrics
Role Based Access Control
Stateful packet filtering
Insiders
14. Password and BioMetric
Flaming
Access Control
Identity Theft
Two factor security
15. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Black Hat
Word Splitting
Script Kiddie
Rule Based Access Control
16. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
External Threat
Token
IEEE 802.1x
War Driving
17. A form of filtering that blocks only sites specified as harmful.
Shoulder Surfing
Clickjacking
Distributed Denial of Service (DDoS)
Blacklisting Software
18. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
Rule Based Access Control
Reverse proxy
Content-Filtering Firewall
19. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
War Driving
RADIUS
Content filtering
Load balancing
20. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Client_Hello
Buffer Overflow
Evil Twin
RADIUS
21. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Worm
Mandatory Access Control
Private
Fencing
22. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Spear Phishing
Smurf Attack
Fencing
Orphaned
23. Floods a Web site with so many requests for service that it slows down or crashes the site
Bluejacking
Orphaned
Authentication request
Denial of service attack
24. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Distributed
Natural Threat
Spear Phishing
LDAP injection
25. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Swiss Cheese
Spear Phishing
Proximity reader
Cracker
26. Due to the limitations of online guessing - most password attacks today use ____.
Biometrics
Roller barrier
Replay Attack
Offline cracking
27. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Roller barrier
Smurf Attack
LDAP injection
Resident
28. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Fake Antivirus
Cybercriminals
Backup scope
Identification
29. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
CHAP (Challenge Handshake Authentication Protocol)
Brute Force
Malicious Insiders
Authentication request
30. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Hacker
Eavesdropping Attack
Subject
Token
31. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Authentication request
DNS
Protocol analyzer
ARP Poisoning
32. Using a single authentication credential that is shared across multiple networks.
Rainbow Tables
Honeynet
Subject
Identity management
33. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Cyberstalking/Harassment
Wireless security
Vishing
Man-in-the-Middle Attack
34. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Flashing
ACL (Access Control List)
Cognitive biometrics
Protocol analyzer
35. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Association request
Trusted OS
Web security gateway
DNS
36. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Cipher locks
Eavesdropping Attack
White Hat
Password
37. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Electronic Activist (hacktivist)
Bluejacking
Protocol analyzer
IEEE 802.1x
38. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
LDAP injection
Session hijacking
Separation of duties
Environmental Threat
39. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Brute Force Attack
Man-made Threat
Two factor security
Virtualization
40. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
UDP Flood
Eavesdropping Attack
Speech recognition
Session hijacking
41. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Data
Cognitive biometrics
Access Control
Buffer Overflow
42. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
MPack
Proximity reader
Bluesnarfing
Spyware
43. An attack that forces a user to unintentionally click a link.
Clickjacking
Identity management
Extreme temperatures
Dwell Time
44. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Electronic eavesdropping
Blacklisting Software
Cipher locks
ACL (Access Control List)
45. The process of verifying that your backups actually work
Testing
Orphaned
DAC
SSO
46. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Dumpster Diving
DNS Log
Man-made Threat
Clickjacking
47. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Bluejacking
Geometric variance
Drive-by Download
Smurf Attack
48. A user under Role Based Access Control can be assigned only one ____.
Stateful packet filtering
Role
Identity management
Mandatory Access Control
49. The time it takes for a key to be pressed and then released.
Dwell Time
Role
Tailgate sensors
Honeynet
50. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Encryption
Media for backups
Brute Force
Server-Side