SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Trojan-horse virus
Association request
Cognitive biometrics
Testing
2. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Bluejacking
Roller barrier
DAP
Root
3. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Rootkit
Hardware Attack
BioMetric devices
Identity Theft
4. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
War Driving
Association request
Replay Attack
Hybird
5. Below 40% or above 50%
Ciphertext
Virtualization
Cyber Theft
Extreme Humidity
6. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Cognitive biometrics
Cyberbullying
Electronic eavesdropping
Proximity reader
7. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Denial of service attack
DLP
Private
Chain
8. These accounts are user accounts that remain active after an employee has left an organization.
Extreme temperatures
Orphaned
Whaling
Electronic Activist (hacktivist)
9. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Scatternet
Trojan-horse virus
Stateful packet filtering
Content-Filtering Firewall
10. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Internal Threat
Private
WEP (Wired Equivalent Privacy)
Data
11. Software that can guess passwords
Password Crackers
Hybird
Password
Content inspection
12. An attack that forces a user to unintentionally click a link.
Social engineering
Macro
Clickjacking
Rainbow Tables
13. Forwards packets across computer networks.
DNS Log
Character
Router
Brute Force Attack
14. A technique for crashing by sending too much data to the buffer in a comuter's memory
Natural Threat
Spimming
Adware
Buffer Overflow
15. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Identification
Two factor security
ARP Poisoning
Stateless Firewall
16. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Spyware
Cloud computing
Malicious code
Two factor security
17. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Adware
Role
Identification
Insiders
18. How secure the data in your backups is-can use physical security or encryption
Tailgate sensors
Security
Scatternet
Stateful packet filtering
19. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Cybercriminals
External Threat
OAuth
Bluejacking
20. A ____ is a network set up with intentional vulnerabilities.
Dwell Time
Physical security
Electronic Activist (hacktivist)
Honeynet
21. An attack that sends unsolicited messages to Bluetooth-enabled devices.
CCTV
Bluejacking
Open Port
Geometric variance
22. A ____ encrypts all data that is transmitted between the remote device and the network.
Authentication request
VPN
Router
Amart card
23. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
Flaming
TCP/IP
RADIUS
24. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Extreme temperatures
Speech recognition
Reverse proxy
Bluesnarfing
25. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
LEAP
Hoaxes
Buffer Overflow
Root
26. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Cipher locks
DNS Hijacking
Distributed
Physical security
27. Indicates when an account is no longer active.
Account expiration
War Driving
Rogue
DNS Hijacking
28. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Content-Filtering Firewall
Rootkit
Content inspection
Mandatory Access Control
29. A private key and public key
What is asymmetic encryption?
Vishing
Spyware
ICMP Flood
30. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
DAP
Port Scanner
DNS Log
CHAP (Challenge Handshake Authentication Protocol)
31. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
ACL (Access Control List)
Chain
Hacker
Ciphertext
32. An AP that is set up by an attacker.
Scatternet
Zone transfer
Evil Twin
Dumpster Diving
33. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Content-Filtering Firewall
TCP/IP
Token
Geometric variance
34. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Wireless VLANs
Proximity reader
Content-Filtering Firewall
Content inspection
35. Four interrelated aspects to _________:Access - data - infrastructure - computers
Insiders
Physical security
Testing
Cipher locks
36. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Cyberstalking/Harassment
ARP Poisoning
Bluesnarfing
MPack
37. A ____ is designed to separate a nonsecured area from a secured area.
Mantrap
Impersonation
Password
Digital Certificate
38. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Trusted OS
Kerberos
Cybercriminals
WEP (Wired Equivalent Privacy)
39. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
War Driving
Distributed Denial of Service (DDoS)
Subject
40. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
PAT
Router
BioMetric devices
Authentication
41. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Testing
CardSpace
Extreme temperatures
Password
42. These attacks may allow an attacker to construct LDAP statements based on user input statements.
LDAP injection
External Threat
Social engineering
Logic Bomb
43. When DNS servers exchange information among themselves it is known as a ____.
Shoulder Surfing
Zone transfer
Subject
Cracker
44. A set of permissions that are attached to an object.
70
Bluesnarfing
ACL
Bluejacking
45. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
External Threat
Malicious code
Trojan-horse virus
Session hijacking
46. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Packet filtering
ACL (Access Control List)
Scatternet
47. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
SYN Flood
Flaming
Natural Threat
Insiders
48. Floods a Web site with so many requests for service that it slows down or crashes the site
Replicating
Floor Guard
Testing
Denial of service attack
49. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Evil Twin
Reverse proxy
Cyberbullying
Password Crackers
50. ____ can be prewired for electrical power as well as wired network connections.
Fake Antivirus
Locking Cabinets
PAT
Geometric variance