SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How often you perform your backups (cost-benefit analysis of backing up)
TCP/IP
Stateful Firewall
Backup frequency
Password Crackers
2. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Backup frequency
Proximity reader
computer footprint
EAP
3. Password and BioMetric
Amart card
Two factor security
CHAP (Challenge Handshake Authentication Protocol)
Backup frequency
4. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Electronic eavesdropping
Cybercriminals
Root
DLP
5. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Malicious code
Reverse proxy
Adware
Private
6. Sending high volumes of UDP requests to a target.
Tailgating
Offline cracking
Cognitive biometrics
UDP Flood
7. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
ACL (Access Control List)
Geometric variance
History
Token
8. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
Cognitive biometrics
History
DNS poisoning
9. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Spear Phishing
Environmental Threat
Dumpster Diving
Fake Antivirus
10. Ensures that messages are not corrupt or tampered with
Router
Cyberterrorist
Spimming
Hash encoding
11. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Mandatory Access Control
Word Splitting
Cybercriminals
Packet tampering
12. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
Distributed storage
70
Cloud computing
13. Scrambles information into an alternative form that requires a key or password to decrypt the information
Encryption
Biometrics
Human memory
Packet tampering
14. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Wireless security
Cognitive biometrics
Root
White box
15. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Account expiration
Distributed
External Threat
DLP
16. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Protocol analyzer
Roller barrier
Cognitive biometrics
LDAP injection
17. Floods a Web site with so many requests for service that it slows down or crashes the site
Router
Denial of service attack
Content inspection
CardSpace
18. Small electronic devices that change user passwords automatically
Testing
DAP
Token
Blacklisting Software
19. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Electronic Activist (hacktivist)
Packet tampering
Insiders
Loop Protection
20. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Account expiration
Brute Force Attack
Bluesnarfing
Clickjacking
21. Form of phishing that targets wealthy individuals.
SSO
Whaling
Biometrics
Roller barrier
22. Software that can guess passwords
Trojan-horse virus
Password Crackers
CCTV
Information security
23. Viruses and worms are said to be self-____.
Man-made Threat
Rainbow Tables
Fake Antivirus
Replicating
24. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP Poisoning
Bluejacking
Protocol analyzer
Electronic Vandal
25. Provides a greater degree of security by implementing port-based authentication.
Speech recognition
Authorization
IEEE 802.1x
Electronic Vandal
26. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Rootkit
Security
Backup scope
Zone transfer
27. A security analysis of the transaction within its approved context.
CardSpace
Kerberos
Content inspection
DNS poisoning
28. The action that is taken by the subject over the object is called a ____.
Flaming
Swiss Cheese
Operation
Hardware Attack
29. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Port Scanner
Firewalls
Spyware
Content inspection
30. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Environmental Threat
Speech recognition
Roller barrier
Hash encoding
31. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Drive-by Download
Ciphertext
Flaming
Trusted OS
32. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Spear Phishing
Fencing
Firewalls
Phishing
33. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
CHAP (Challenge Handshake Authentication Protocol)
Cipher locks
Bluejacking
34. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Tailgate sensors
Physical security access control measures
Client_Hello
SYN Flood
35. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Content inspection
DNS poisoning
Rogue
Social engineering
36. Could become a key element in authentication in the future.
Buffer Overflow
Malicious code
Standard biometrics
Cognitive biometrics
37. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Script Kiddie
SYN Flood
Fencing
Access Control
38. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Black Hat
Vishing
Mandatory Access Control
Hybird
39. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Character
DNS Hijacking
Hardware Attack
Rainbow Tables
40. When DNS servers exchange information among themselves it is known as a ____.
EAP
Rule Based Access Control
Internal Threat
Zone transfer
41. It is able to code and decode data
CCTV
Environmental Threat
Symmetric encryption
Electronic eavesdropping
42. Fingerprints and patterns
Standard biometrics
BioMetric devices
Adware
Honeypot
43. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Stateless Firewall
MPack
Separation of duties
Web security gateway
44. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Access Control
Adware
War Driving
Script Kiddie
45. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
What is asymmetic encryption?
Separation of duties
Cognitive biometrics
Cyberbullying
46. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Adware
Backup scope
Extreme Humidity
Protocol analyzer
47. A user under Role Based Access Control can be assigned only one ____.
Eavesdropping Attack
Blacklisting Software
Dwell Time
Role
48. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Cognitive biometrics
Impersonation
External Threat
Subject
49. Lock - conduit - card key - video equipment - secured guard
Electronic Activist (hacktivist)
Logic Bomb
Reverse proxy
Physical security access control measures
50. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
LDAP injection
WEP (Wired Equivalent Privacy)
IEEE 802.1x
ACL