SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
SYN Flood
Macro
ARP Poisoning
Access Control
2. Small electronic devices that change user passwords automatically
OAuth
Testing
Token
Kerberos
3. An AP that is set up by an attacker.
Evil Twin
Bluejacking
Eavesdropping Attack
Authorization
4. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Trojan-horse virus
Content filtering
Man-made Threat
PAT
5. A secret combination of letters - numbers - and/or characters that only the user should know.
Virtualization
What is asymmetic encryption?
Password
Extreme temperatures
6. A framework for transporting authentication protocols instead of the authentication protocol itself.
Load balancing
ACL
Association request
EAP
7. Related to the perception - thought process - and understanding of the user.
Man-made Threat
Cognitive biometrics
Ciphertext
Replicating
8. A ____ is a network set up with intentional vulnerabilities.
Man-in-the-Middle Attack
Honeynet
computer footprint
IEEE 802.1x
9. ____ attacks are responsible for half of all malware delivered by Web advertising.
DNS poisoning
DAP
Adware
Fake Antivirus
10. Allows a single access point to service different types of users.
Wireless VLANs
Port Scanner
Cyberterrorist
Loop Protection
11. Floods a Web site with so many requests for service that it slows down or crashes the site
Symmetric encryption
Smurf Attack
Firewall logs
Denial of service attack
12. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Electronic Vandal
White Hat
Adware
DNS Log
13. Pretending to be another person.
DLP
Impersonation
Black Hat
Firewall logs
14. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Firewall logs
Flashing
Brute Force
Distributed Denial of Service (DDoS)
15. A ____ virus infects the Master Boot Record of a hard disk drive.
Port Scanner
Boot
Firewalls
Human memory
16. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Adware
Black Hat
Server-Side
TCP/IP
17. Below 70 degrees or above 75 degrees
Extreme temperatures
Identity management
Fencing
Role Based Access Control
18. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Resident
Chain
Boot
19. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Vishing
Spimming
White box
Mouse Trapping
20. The weakness of passwords centers on ____.
Prevention and detection
Cracker
Human memory
Authorization
21. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Wireless security
Rogue
Subject
Proximity reader
22. How many past backups you keep - what you did on your machine etc.
Session hijacking
Malicious code
History
Token
23. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Internal Threat
DNS Hijacking
Hash encoding
Evil Twin
24. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Cognitive biometrics
Identity management
Whaling
Ciphertext
25. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
Loop Protection
Cognitive biometrics
Phishing
26. Ensures that messages are not corrupt or tampered with
Hash encoding
Speech recognition
Man-made Threat
Whaling
27. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
MPack
Fake Antivirus
ARP Poisoning
DAP
28. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Role Based Access Control
Federated identity management
Script Kiddie
Man-made Threat
29. Wants to cause as much damage as possible - without a particular target or goal.
Spoofing
Electronic Vandal
Smurf Attack
Stateful packet filtering
30. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Malicious Insiders
Role
BioMetric devices
White Hat
31. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Worm
Cracker
Bluesnarfing
What is asymmetic encryption?
32. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Firewalls
Cognitive biometrics
Chain
Rogue
33. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Cracker
Clickjacking
GIF Layering
White box
34. The process of verifying that your backups actually work
Cyberterrorist
Testing
Authentication request
Zone transfer
35. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Backup scope
Extreme temperatures
Role
Social engineering
36. Sending high volumes of UDP requests to a target.
Shoulder Surfing
Cipher locks
Rogue
UDP Flood
37. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Port Scanner
Wireless VLANs
Information security
Extreme temperatures
38. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
LEAP
Sniffer
ICMP Flood
Spear Phishing
39. A pay-per-use computing model in which customers pay only for the computing resources they need.
Replay
Cloud computing
War Driving
Server-Side
40. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
ARP Poisoning
Hash encoding
Biometrics
RADIUS
41. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Digital Certificate
Biometrics
Backup frequency
War Driving
42. Sifting through a company's garbage to find information to help break into their computers
Protocol analyzer
TACACS
Backup frequency
Dumpster Diving
43. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Standard biometrics
Hacker
Operation
RADIUS
44. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Server-Side
Proximity reader
Reverse proxy
Load balancing
45. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Physical security
Hash encoding
DLP
Trojan-horse virus
46. A variety of threats such as viruses - worms - and Trojan horses
Cyberstalking/Harassment
Loop Protection
Malicious code
White box
47. Fingerprints and patterns
Bluejacking
Bluejacking
DAC
BioMetric devices
48. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Hardware Attack
Flaming
Bluesnarfing
Authentication request
49. ____ is an image spam that is divided into multiple images.
Digital Certificate
Operation
Packet filtering
GIF Layering
50. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Operation
Information security
Bluejacking
Bluesnarfing