SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Password and BioMetric
DNS
CardSpace
Sniffer
Two factor security
2. When DNS servers exchange information among themselves it is known as a ____.
Natural Threat
Zone transfer
CCTV
Rainbow Tables
3. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Sniffer
Blacklisting Software
Mouse Trapping
Dumpster Diving
4. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Hoaxes
Tailgate sensors
TCP/IP
Geometric variance
5. Below 40% or above 50%
Extreme Humidity
Testing
Swiss Cheese
Blacklisting Software
6. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
GIF Layering
Distributed
Hardware Attack
EAP
7. ____ attacks are responsible for half of all malware delivered by Web advertising.
Denial of service attack
Fake Antivirus
Three-Way Handshake
NAT
8. How often you perform your backups (cost-benefit analysis of backing up)
Backup frequency
Buffer Overflow
Spyware
Chain
9. A ____ virus infects the Master Boot Record of a hard disk drive.
Rule Based Access Control
Boot
Cloud computing
Internal Threat
10. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
Zone transfer
Subject
Hybird
11. A firewall that can block designated types of traffic from entering a protected network.
Content-Filtering Firewall
Phishing
What is asymmetic encryption?
Authorization
12. Often used for managing user access to one or more systems.
Cyberbullying
Honeynet
Rule Based Access Control
Open Port
13. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Spoofing
Port Scanner
Role Based Access Control
Flashing
14. The most restrictive access control model is ____.
Mandatory Access Control
Eavesdropping Attack
DNS Hijacking
ACL
15. Small electronic devices that change user passwords automatically
White box
EAP
Token
Offline cracking
16. Wants to cause as much damage as possible - without a particular target or goal.
Cyberterrorist
Electronic Vandal
Bluejacking
Password
17. A firewall capable of monitoring a data stream from end to end.
Stateful Firewall
Extreme Humidity
Subject
Physical security
18. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
CardSpace
Adware
Router
Vishing
19. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
IEEE 802.1x
CardSpace
Environmental Threat
Denial of service attack
20. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Load balancing
Environmental Threat
Backup scope
Replay
21. A ____ attack is similar to a passive man-in-the-middle attack.
Replay
EAP
Chain
Cybercriminals
22. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Tailgating
Trojan-horse virus
CardSpace
Distributed Denial of Service (DDoS)
23. A user accessing a computer system must present credentials or ____ when logging on to the system.
Virtualization
Identification
Firewall logs
Spimming
24. Web application attacks are considered ____ attacks.
MPack
Account expiration
Distributed
Server-Side
25. The process of verifying that your backups actually work
Protocol analyzer
Testing
Eavesdropping Attack
Phishing
26. The action that is taken by the subject over the object is called a ____.
Token
Operation
TACACS
Identification
27. How many past backups you keep - what you did on your machine etc.
Session hijacking
Client_Hello
Electronic Vandal
History
28. An attacker motivated by the ideology to attack computer or infrastructure networks.
Mantrap
OAuth
Cyberterrorist
Dumpster Diving
29. Floods a Web site with so many requests for service that it slows down or crashes the site
Mantrap
Eavesdropping Attack
Denial of service attack
Port Scanner
30. ____ can be prewired for electrical power as well as wired network connections.
Spyware
Locking Cabinets
Eavesdropping Attack
Internal Threat
31. Securing a restricted area by erecting a barrier is called ____.
Fencing
Electronic Activist (hacktivist)
Fake Antivirus
Stateless Firewall
32. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Encryption
Tailgating
Drive-by Download
Buffer Overflow
33. A set of permissions that are attached to an object.
IEEE 802.1x
ACL
WEP (Wired Equivalent Privacy)
Adware
34. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Packet tampering
SYN Flood
Hybird
Orphaned
35. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Physical security access control measures
Worm
CardSpace
CHAP (Challenge Handshake Authentication Protocol)
36. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Amart card
Session hijacking
Standard biometrics
Resident
37. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
ACL (Access Control List)
Digital Certificate
IEEE 802.1x
SYN Flood
38. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Two factor security
Digital Certificate
External Threat
Port Scanner
39. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
WEP (Wired Equivalent Privacy)
Logic Bomb
Mandatory Access Control
Black Hat
40. Fingerprints and patterns
Scatternet
BioMetric devices
VPN
Honeynet
41. Ensures that messages are not corrupt or tampered with
Loop Protection
Hash encoding
External Threat
War Driving
42. How secure the data in your backups is-can use physical security or encryption
Rainbow Tables
Security
Replay Attack
Malicious Insiders
43. Form of phishing that targets wealthy individuals.
Denial of service attack
Man-made Threat
TCP/IP
Whaling
44. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Private
Cloud computing
DNS poisoning
Honeypot
45. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Natural Threat
Reverse proxy
Replay
Packet tampering
46. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Phishing
Human memory
Geometric variance
Access Control
47. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Amart card
Replay
Password Crackers
Extreme Humidity
48. It accepts spoken words for input as if they had been typed on the keyboard.
Federated identity management
Speech recognition
Flaming
Session hijacking
49. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Spoofing
Replay Attack
Data
Stateless Firewall
50. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Standard biometrics
Trusted OS
Replicating
Port Scanner