SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Standard biometrics
Distributed Denial of Service (DDoS)
Two factor security
War Driving
2. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Fake Antivirus
WEP (Wired Equivalent Privacy)
Evil Twin
Electronic eavesdropping
3. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
DNS Hijacking
LEAP
Association request
Cipher locks
4. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Sniffer
BioMetric devices
Session hijacking
Private
5. A user under Role Based Access Control can be assigned only one ____.
Role
Authorization
Honeypot
Proximity reader
6. People very knowledgeable about computers who use their knowledge to invade other people's computers
Information security
Content filtering
Hacker
Virus
7. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Trusted OS
Mouse Trapping
Spimming
Rainbow Tables
8. Password and BioMetric
Bluejacking
Honeynet
Two factor security
Zone transfer
9. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
CHAP (Challenge Handshake Authentication Protocol)
Honeypot
ACL
White box
10. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Identity management
ARP Poisoning
Subject
TCP/IP
11. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Testing
Port Scanner
Resident
Authentication
12. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Extreme temperatures
Malicious code
Smurf Attack
Virtualization
13. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Rainbow Tables
Two factor security
ARP Poisoning
Load balancing
14. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Open Port
Social engineering
Rogue
15. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
UDP Flood
Ciphertext
Role Based Access Control
Biometrics
16. The weakness of passwords centers on ____.
What is asymmetic encryption?
70
Smurf Attack
Human memory
17. Could become a key element in authentication in the future.
History
Man-made Threat
Cognitive biometrics
Electronic Vandal
18. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Subject
Content inspection
Load balancing
Macro
19. Software that can guess passwords
Password Crackers
White box
Replay Attack
Challenge
20. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Cloud computing
Token
Client_Hello
Spear Phishing
21. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Resident
Floor Guard
70
22. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Separation of duties
Proximity reader
Access Control
Buffer Overflow
23. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Bluesnarfing
Three-Way Handshake
Flashing
Packet tampering
24. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
DNS poisoning
Boot
Hacker
Packet tampering
25. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Cyberterrorist
WEP (Wired Equivalent Privacy)
Rootkit
PAT
26. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Extreme Humidity
Malicious Insiders
Bluesnarfing
Shoulder Surfing
27. A technique for crashing by sending too much data to the buffer in a comuter's memory
Buffer Overflow
War Driving
Information security
Word Splitting
28. Indicates when an account is no longer active.
Account expiration
ICMP Flood
Standard biometrics
OAuth
29. It is able to code and decode data
Port Scanner
70
Loop Protection
Symmetric encryption
30. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Role Based Access Control
Biometrics
Mandatory Access Control
Information security
31. ____ attacks are responsible for half of all malware delivered by Web advertising.
Amart card
Fake Antivirus
Packet filtering
Replicating
32. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
ARP Poisoning
Cyberterrorist
Bluejacking
DMS (Demilitarized Zone)
33. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
Replay Attack
Distributed
Man-in-the-Middle Attack
34. Content filtering - encryption - firewalls
Shoulder Surfing
Wireless VLANs
LDAP injection
Prevention and detection
35. How secure the data in your backups is-can use physical security or encryption
70
Security
Cyber Theft
Brute Force Attack
36. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Hybird
Electronic Vandal
Honeynet
History
37. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Stateless Firewall
Flashing
computer footprint
LDAP injection
38. Scrambles information into an alternative form that requires a key or password to decrypt the information
SSO
Encryption
Security
Amart card
39. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Bluesnarfing
Trojan-horse virus
CardSpace
Role Based Access Control
40. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
White Hat
Hoaxes
Dwell Time
41. Fingerprints and patterns
Distributed Denial of Service (DDoS)
DNS Hijacking
Protocol analyzer
BioMetric devices
42. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Adware
UDP Flood
Backup scope
Man-made Threat
43. The most restrictive access control model is ____.
Hybird
Rogue
Federated identity management
Mandatory Access Control
44. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Authentication
Cipher locks
TACACS
Malicious Insiders
45. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Environmental Threat
Drive-by Download
Separation of duties
Backup frequency
46. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Proximity reader
CCTV
Web security gateway
Ciphertext
47. Pretending to be another person.
SYN Flood
Physical security
Impersonation
Identity management
48. An attacker motivated by the ideology to attack computer or infrastructure networks.
IEEE 802.1x
Cyberterrorist
CCTV
White box
49. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Authentication request
Virus
Replay Attack
UDP Flood
50. A group of piconets in which connections exist between different piconets is called a ____.
Scatternet
Mouse Trapping
Fencing
LDAP injection
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests