SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
UDP Flood
NAT
Distributed Denial of Service (DDoS)
Role Based Access Control
2. ____ attacks are responsible for half of all malware delivered by Web advertising.
Buffer Overflow
History
Fake Antivirus
Rootkit
3. Related to the perception - thought process - and understanding of the user.
Cognitive biometrics
Challenge
Offline cracking
Cipher locks
4. Allows a single access point to service different types of users.
Wireless VLANs
Cracker
Account expiration
ICMP Flood
5. Scrambles information into an alternative form that requires a key or password to decrypt the information
Physical security access control measures
Cipher locks
Content inspection
Encryption
6. Sending high volumes of ICMP (usually ping) packets to a target.
Adware
LDAP injection
ICMP Flood
Bluesnarfing
7. An attacker slips through a secure area following a legitimate employee.
Open Port
Honeypot
Tailgating
Locking Cabinets
8. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
Honeynet
Load balancing
Resident
9. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
Reverse proxy
Flashing
Port Scanner
10. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
computer footprint
Impersonation
Roller barrier
Backup scope
11. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Data
Adware
Social engineering
Insiders
12. How many past backups you keep - what you did on your machine etc.
History
Spoofing
Hardware Attack
Account expiration
13. Can create entries in a log for all queries that are received.
SYN Flood
DNS Log
Symmetric encryption
Fencing
14. A technique for crashing by sending too much data to the buffer in a comuter's memory
Data
Buffer Overflow
Spimming
VPN
15. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Spoofing
Electronic eavesdropping
Hoaxes
DLP
16. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Cloud computing
Web security gateway
Logic Bomb
Reverse proxy
17. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Information security
Hoaxes
DAC
Adware
18. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
CardSpace
Phishing
Hacker
Macro
19. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Insiders
OAuth
LDAP injection
ACL (Access Control List)
20. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Access Control
CCTV
Firewalls
Content inspection
21. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Media for backups
Logic Bomb
DNS poisoning
Hoaxes
22. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Spyware
DNS
White Hat
Two factor security
23. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
DNS poisoning
Port Scanner
Mandatory Access Control
Virtualization
24. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Router
Locking Cabinets
Rootkit
Buffer Overflow
25. Viruses and worms are said to be self-____.
Loop Protection
Replicating
Natural Threat
Association request
26. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Token
LEAP
Three-Way Handshake
Cracker
27. It accepts spoken words for input as if they had been typed on the keyboard.
Rootkit
Physical security
Impersonation
Speech recognition
28. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Flashing
Chain
Tailgating
Spear Phishing
29. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
NAT
DAC
Flashing
30. ____ involves horizontally separating words - although it is still readable by the human eye.
Media for backups
CCTV
Extreme temperatures
Word Splitting
31. Using a single authentication credential that is shared across multiple networks.
Identity management
Proximity reader
Drive-by Download
Web security gateway
32. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Flashing
Blacklisting Software
Character
DAP
33. The time it takes for a key to be pressed and then released.
ACL
DLP
Dwell Time
Proximity reader
34. Securing a restricted area by erecting a barrier is called ____.
Fencing
White Hat
Server-Side
Dumpster Diving
35. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Swiss Cheese
Flashing
CardSpace
Logic Bomb
36. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
CardSpace
Spimming
DMS (Demilitarized Zone)
OAuth
37. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Word Splitting
Stateless Firewall
Speech recognition
Rogue
38. A form of filtering that blocks only sites specified as harmful.
Password
Wireless VLANs
White Hat
Blacklisting Software
39. Software that can guess passwords
Distributed Denial of Service (DDoS)
Bluejacking
Password Crackers
Spear Phishing
40. Broadcast storms can be prevented with ____.
Loop Protection
Role Based Access Control
Authorization
Vishing
41. Often used for managing user access to one or more systems.
Extreme temperatures
Natural Threat
Prevention and detection
Rule Based Access Control
42. ____ is an image spam that is divided into multiple images.
GIF Layering
Zone transfer
Honeynet
Information security
43. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Digital Certificate
Firewalls
Blacklisting Software
SSO
44. When DNS servers exchange information among themselves it is known as a ____.
Trojan-horse virus
Identity management
Zone transfer
Access Control
45. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Brute Force Attack
Proximity reader
CHAP (Challenge Handshake Authentication Protocol)
Buffer Overflow
46. Content filtering - encryption - firewalls
Prevention and detection
Evil Twin
Server-Side
DLP
47. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
WEP (Wired Equivalent Privacy)
Phishing
Bluesnarfing
Distributed storage
48. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
DLP
Hardware Attack
Adware
Virus
49. A private key and public key
TACACS
What is asymmetic encryption?
White Hat
Cipher locks
50. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Hardware Attack
Private
PAT
Social engineering
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests