SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Server-Side
Insiders
Brute Force Attack
Bluesnarfing
2. Viruses and worms are said to be self-____.
Replicating
Packet tampering
Wireless VLANs
Replay Attack
3. Wants to cause as much damage as possible - without a particular target or goal.
Wireless security
Blacklisting Software
Electronic Vandal
Worm
4. The ____ model is the least restrictive.
Router
WEP (Wired Equivalent Privacy)
Boot
DAC
5. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
MPack
Bluejacking
Hacker
Internal Threat
6. An attacker motivated by the ideology to attack computer or infrastructure networks.
Cyberterrorist
Load balancing
Rogue
Firewall logs
7. Could become a key element in authentication in the future.
Hoaxes
Cognitive biometrics
Black Hat
Cyberbullying
8. The process of verifying that your backups actually work
Testing
Information security
Proximity reader
Word Splitting
9. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Hacker
Kerberos
ARP Poisoning
DNS poisoning
10. Fingerprints and patterns
Authentication request
BioMetric devices
Data
Speech recognition
11. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Federated identity management
White Hat
Spoofing
Cyberbullying
12. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Session hijacking
Shoulder Surfing
Role Based Access Control
Adware
13. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Loop Protection
Protocol analyzer
ACL (Access Control List)
Human memory
14. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Malicious Insiders
Backup frequency
Bluejacking
Impersonation
15. Pretending to be another person.
Denial of service attack
Impersonation
Electronic Activist (hacktivist)
Port Scanner
16. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Replicating
DNS
Eavesdropping Attack
Hardware Attack
17. It is able to code and decode data
Prevention and detection
Shoulder Surfing
Symmetric encryption
Word Splitting
18. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Virtualization
Wireless VLANs
Operation
Macro
19. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Human memory
Wireless security
Sniffer
Challenge
20. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Adware
Man-in-the-Middle Attack
Testing
21. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Smurf Attack
Cyberstalking/Harassment
Character
Operation
22. A firewall capable of monitoring a data stream from end to end.
Tailgating
Role Based Access Control
Stateful Firewall
Whaling
23. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Chain
SYN Flood
Separation of duties
Tailgate sensors
24. A security analysis of the transaction within its approved context.
Content inspection
Packet filtering
Insiders
GIF Layering
25. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Account expiration
Kerberos
Vishing
Eavesdropping Attack
26. The protection of information from accidental or intentional misuse by persons inside or outside an organization
SSO
Content inspection
Rogue
Information security
27. A technique for crashing by sending too much data to the buffer in a comuter's memory
Two factor security
Buffer Overflow
White box
Client_Hello
28. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Sniffer
Flaming
Brute Force
Rootkit
29. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Web security gateway
Character
Cyberterrorist
Client_Hello
30. The weakness of passwords centers on ____.
70
Virus
Human memory
UDP Flood
31. Sending high volumes of ICMP (usually ping) packets to a target.
ICMP Flood
Hacker
Cyber Theft
Roller barrier
32. A ____ attack is similar to a passive man-in-the-middle attack.
Replay
Role
Biometrics
LEAP
33. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Eavesdropping Attack
Firewalls
Rootkit
Extreme temperatures
34. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Roller barrier
Mandatory Access Control
Worm
DAP
35. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Challenge
Fencing
Packet tampering
Account expiration
36. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Brute Force
Locking Cabinets
Extreme temperatures
Electronic eavesdropping
37. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Role
Subject
Distributed storage
38. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
computer footprint
Social engineering
Clickjacking
What is asymmetic encryption?
39. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Honeypot
PAT
Role Based Access Control
Extreme temperatures
40. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Stateful packet filtering
RADIUS
WEP (Wired Equivalent Privacy)
Reverse proxy
41. ____ involves horizontally separating words - although it is still readable by the human eye.
Protocol analyzer
Dwell Time
Extreme temperatures
Word Splitting
42. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Authentication
Flashing
PAT
Two factor security
43. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
TCP/IP
OAuth
Flashing
Replay Attack
44. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Stateful Firewall
DAP
Vishing
Media for backups
45. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
Brute Force
Worm
DNS Hijacking
46. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Character
DNS poisoning
Virtualization
47. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Stateful packet filtering
Cognitive biometrics
TCP/IP
Flashing
48. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
Electronic Vandal
Character
Sniffer
49. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Character
Spear Phishing
Authorization
50. Below 40% or above 50%
Packet filtering
MPack
Extreme Humidity
Token
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests