SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
DNS Hijacking
SYN Flood
External Threat
Brute Force Attack
2. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Subject
Password Crackers
Distributed
VPN
3. A technique that allows private IP addresses to be used on the public Internet.
Authorization
NAT
Role Based Access Control
What is asymmetic encryption?
4. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Stateless Firewall
Cloud computing
Information security
DNS
5. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Cognitive biometrics
LEAP
Malicious Insiders
Federated identity management
6. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
War Driving
Physical security
Identity Theft
Eavesdropping Attack
7. Due to the limitations of online guessing - most password attacks today use ____.
Access Control
Internal Threat
Offline cracking
TCP/IP
8. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Hash encoding
Replicating
ACL
Client_Hello
9. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Cybercriminals
Scatternet
Shoulder Surfing
10. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
DAC
ARP Poisoning
Cyberstalking/Harassment
11. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Virus
DNS
Information security
RADIUS
12. When DNS servers exchange information among themselves it is known as a ____.
Man-in-the-Middle Attack
BioMetric devices
Authorization
Zone transfer
13. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Rogue
LEAP
Resident
Kerberos
14. Pretending to be another person.
Hoaxes
Extreme temperatures
Impersonation
Flaming
15. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Buffer Overflow
CardSpace
Data
Ciphertext
16. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Locking Cabinets
Cyber Theft
Information security
Roller barrier
17. Sending high volumes of UDP requests to a target.
SSO
UDP Flood
Flashing
Hash encoding
18. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Offline cracking
CCTV
Private
Hardware Attack
19. Users who access a Web server are usually restricted to the ____ directory.
Stateful Firewall
Root
Hardware Attack
WEP (Wired Equivalent Privacy)
20. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Malicious Insiders
Adware
DAP
Smurf Attack
21. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Man-in-the-Middle Attack
Private
Worm
War Driving
22. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
History
Session hijacking
Flashing
Data
23. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Cognitive biometrics
Spoofing
Malicious code
Environmental Threat
24. Four interrelated aspects to _________:Access - data - infrastructure - computers
Physical security
Identity Theft
Kerberos
Hardware Attack
25. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Biometrics
Virus
Spear Phishing
Bluejacking
26. How secure the data in your backups is-can use physical security or encryption
OAuth
Security
Token
Scatternet
27. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Social engineering
Proximity reader
Shoulder Surfing
28. Below 70 degrees or above 75 degrees
Biometrics
Extreme temperatures
Role Based Access Control
Zone transfer
29. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
TACACS
Amart card
Boot
Cognitive biometrics
30. Wants to cause as much damage as possible - without a particular target or goal.
DNS poisoning
Dumpster Diving
Authorization
Electronic Vandal
31. Sending high volumes of ICMP (usually ping) packets to a target.
Honeynet
Packet tampering
70
ICMP Flood
32. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
War Driving
Authorization
CHAP (Challenge Handshake Authentication Protocol)
Firewall logs
33. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Server-Side
Replay Attack
Hardware Attack
Role
34. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Worm
Rogue
Scatternet
Phishing
35. A user accessing a computer system must present credentials or ____ when logging on to the system.
Honeypot
Clickjacking
Identification
Word Splitting
36. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Stateless Firewall
Open Port
Three-Way Handshake
Hoaxes
37. Ensures that messages are not corrupt or tampered with
DAC
Hash encoding
Phishing
Web security gateway
38. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Stateful Firewall
DNS Hijacking
Social engineering
Prevention and detection
39. Provides a greater degree of security by implementing port-based authentication.
IEEE 802.1x
Trusted OS
Router
White box
40. A firewall capable of monitoring a data stream from end to end.
Stateful Firewall
NAT
Identity management
Rainbow Tables
41. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
Root
VPN
Offline cracking
42. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
Social engineering
Replay
Extreme temperatures
43. Can be used to determine whether new IP addresses are attempting to probe the network.
Amart card
PAT
Firewall logs
Identification
44. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Macro
Backup scope
Ciphertext
VPN
45. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
WEP (Wired Equivalent Privacy)
Macro
Role Based Access Control
Access Control
46. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Eavesdropping Attack
MPack
Man-made Threat
Stateful packet filtering
47. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Session hijacking
Vishing
Rainbow Tables
Man-made Threat
48. A ____ attack is similar to a passive man-in-the-middle attack.
BioMetric devices
Replay
Phishing
Tailgating
49. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Mantrap
Bluesnarfing
Replicating
Security
50. A method for confirming users' identities
Physical security
Boot
WEP (Wired Equivalent Privacy)
Authentication
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests