SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Form of phishing that targets wealthy individuals.
Hardware Attack
Impersonation
Resident
Whaling
2. A ____ is designed to separate a nonsecured area from a secured area.
Electronic eavesdropping
Mantrap
Distributed
Content inspection
3. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Shoulder Surfing
Identity management
Operation
Rainbow Tables
4. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Man-made Threat
Authentication request
Fake Antivirus
Stateless Firewall
5. Often used for managing user access to one or more systems.
Loop Protection
DNS Log
computer footprint
Rule Based Access Control
6. When organizations use software that filters content to prevent the transmission of unauthorized information
DLP
PAT
Challenge
Content filtering
7. Ensures that messages are not corrupt or tampered with
Hash encoding
Honeynet
DAP
Cognitive biometrics
8. How secure the data in your backups is-can use physical security or encryption
Open Port
Security
Association request
Cipher locks
9. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Man-made Threat
Rogue
Social engineering
DAP
10. A firewall capable of monitoring a data stream from end to end.
Load balancing
Stateful Firewall
Symmetric encryption
Adware
11. Sifting through a company's garbage to find information to help break into their computers
Cyberstalking/Harassment
Dumpster Diving
Sniffer
Insiders
12. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Phishing
Account expiration
Challenge
Bluesnarfing
13. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Session hijacking
LDAP injection
Hash encoding
BioMetric devices
14. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
TCP/IP
Token
Three-Way Handshake
Electronic eavesdropping
15. How often you perform your backups (cost-benefit analysis of backing up)
Physical security access control measures
Brute Force Attack
Backup frequency
Stateful packet filtering
16. The time it takes for a key to be pressed and then released.
Hardware Attack
Dwell Time
Blacklisting Software
Packet filtering
17. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Identity management
Smurf Attack
White Hat
18. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Clickjacking
Hybird
Content inspection
19. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Cyberbullying
Stateless Firewall
Virtualization
RADIUS
20. Software that can guess passwords
Adware
Password Crackers
Distributed
Operation
21. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Firewalls
Swiss Cheese
Hybird
Information security
22. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
Orphaned
Password Crackers
Adware
23. Using a single authentication credential that is shared across multiple networks.
Denial of service attack
Impersonation
Identity management
Client_Hello
24. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Internal Threat
ACL
Hardware Attack
Token
25. Indicates when an account is no longer active.
Identification
Content inspection
Account expiration
Mantrap
26. A private key and public key
Flaming
Role
What is asymmetic encryption?
Character
27. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Firewall logs
DLP
White Hat
SSO
28. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Hardware Attack
Bluejacking
Evil Twin
DNS Log
29. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Hash encoding
Password
Brute Force Attack
30. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Spear Phishing
Bluejacking
Smurf Attack
Token
31. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Content-Filtering Firewall
Floor Guard
Natural Threat
Digital Certificate
32. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Cyberstalking/Harassment
Spimming
Two factor security
ARP Poisoning
33. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
Identity Theft
Authentication request
Trusted OS
34. A set of permissions that are attached to an object.
NAT
Stateless Firewall
ACL
DMS (Demilitarized Zone)
35. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Role
Scatternet
What is asymmetic encryption?
Rootkit
36. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Two factor security
TACACS
Separation of duties
Cybercriminals
37. A technology that can help to evenly distribute work across a network.
Session hijacking
Load balancing
Orphaned
Floor Guard
38. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Wireless VLANs
Scatternet
Kerberos
Rainbow Tables
39. A ____ attack is similar to a passive man-in-the-middle attack.
Replay
Loop Protection
Adware
Physical security
40. A user under Role Based Access Control can be assigned only one ____.
Role
Resident
Drive-by Download
Script Kiddie
41. ____ involves horizontally separating words - although it is still readable by the human eye.
Protocol analyzer
Packet filtering
Word Splitting
Session hijacking
42. It accepts spoken words for input as if they had been typed on the keyboard.
Speech recognition
Hash encoding
Cracker
Electronic Vandal
43. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Floor Guard
Authentication request
TCP/IP
Standard biometrics
44. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
ACL
Data
UDP Flood
Amart card
45. Due to the limitations of online guessing - most password attacks today use ____.
computer footprint
Offline cracking
DMS (Demilitarized Zone)
Honeypot
46. A method for confirming users' identities
Kerberos
Man-in-the-Middle Attack
Authentication
LDAP injection
47. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
ACL
Flashing
Wireless security
Standard biometrics
48. An attack that forces a user to unintentionally click a link.
Electronic Activist (hacktivist)
Encryption
Clickjacking
Bluejacking
49. A security analysis of the transaction within its approved context.
Symmetric encryption
Data
Separation of duties
Content inspection
50. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Logic Bomb
Evil Twin
ACL (Access Control List)
Content filtering