SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ is an image spam that is divided into multiple images.
GIF Layering
Association request
Password
Dumpster Diving
2. When DNS servers exchange information among themselves it is known as a ____.
Locking Cabinets
Zone transfer
Word Splitting
EAP
3. How many past backups you keep - what you did on your machine etc.
Three-Way Handshake
ICMP Flood
Role Based Access Control
History
4. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Chain
Eavesdropping Attack
Digital Certificate
SSO
5. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Hoaxes
Content filtering
White Hat
Content-Filtering Firewall
6. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Dwell Time
Hash encoding
Security
Internal Threat
7. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Black Hat
ACL
Server-Side
Open Port
8. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Flashing
Human memory
DLP
Packet tampering
9. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Flashing
Orphaned
Extreme Humidity
PAT
10. Fingerprints and patterns
Zone transfer
Electronic Vandal
BioMetric devices
Private
11. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Identification
Protocol analyzer
GIF Layering
Access Control
12. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
DMS (Demilitarized Zone)
Cracker
DNS Hijacking
13. A private key and public key
Fake Antivirus
What is asymmetic encryption?
Port Scanner
OAuth
14. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Replicating
Boot
Flashing
70
15. Hides inside other software - usually as an attachment or a downloadable file
DAC
Identity management
Password
Trojan-horse virus
16. Lock - conduit - card key - video equipment - secured guard
Server-Side
Physical security access control measures
Ciphertext
Replicating
17. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
ARP Poisoning
Brute Force Attack
Backup frequency
Media for backups
18. Wants to cause as much damage as possible - without a particular target or goal.
Impersonation
Man-made Threat
Cognitive biometrics
Electronic Vandal
19. Sending high volumes of ICMP (usually ping) packets to a target.
Hoaxes
ICMP Flood
Port Scanner
Denial of service attack
20. The process of verifying that your backups actually work
Backup frequency
IEEE 802.1x
Testing
Server-Side
21. To create a rainbow table - each ____ begins with an initial password that is encrypted.
ARP Poisoning
Chain
Black Hat
Challenge
22. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Access Control
Adware
TACACS
Digital Certificate
23. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Mouse Trapping
LDAP injection
Proximity reader
Environmental Threat
24. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Access Control
MPack
Kerberos
Shoulder Surfing
25. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
White box
DNS Log
Authentication
Boot
26. Viruses and worms are said to be self-____.
Natural Threat
Flashing
Tailgating
Replicating
27. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Virtualization
Worm
SYN Flood
Roller barrier
28. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Social engineering
Information security
Mandatory Access Control
Virtualization
29. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Word Splitting
ACL (Access Control List)
Vishing
Brute Force Attack
30. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
DNS poisoning
Kerberos
Web security gateway
Content-Filtering Firewall
31. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
External Threat
Stateless Firewall
Man-in-the-Middle Attack
Script Kiddie
32. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Man-made Threat
Orphaned
Content filtering
Prevention and detection
33. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Amart card
70
Identity Theft
Rootkit
34. Form of phishing that targets wealthy individuals.
Stateless Firewall
Whaling
Malicious code
Electronic eavesdropping
35. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
ACL (Access Control List)
DLP
Sniffer
Flaming
36. A firewall capable of monitoring a data stream from end to end.
Authentication request
Speech recognition
Stateful Firewall
Cyber Theft
37. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Password
Zone transfer
Load balancing
Geometric variance
38. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Geometric variance
Flashing
Vishing
Trusted OS
39. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Hacker
Physical security access control measures
TCP/IP
DAP
40. Broadcast storms can be prevented with ____.
Loop Protection
Honeypot
Wireless security
DLP
41. A user under Role Based Access Control can be assigned only one ____.
Replicating
DLP
Role
Scatternet
42. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
Loop Protection
Data
CCTV
43. A program that is automatically downloaded to your computer without your consent or even your knowledge.
White box
Drive-by Download
DAC
Mantrap
44. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Malicious code
Symmetric encryption
Distributed
Token
45. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Stateful Firewall
CHAP (Challenge Handshake Authentication Protocol)
Subject
DNS poisoning
46. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
Honeynet
DAP
Script Kiddie
47. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
OAuth
Fake Antivirus
Role
CCTV
48. A firewall that can block designated types of traffic from entering a protected network.
Cognitive biometrics
ACL
Content-Filtering Firewall
Evil Twin
49. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Replay
Phishing
Vishing
Shoulder Surfing
50. Content filtering - encryption - firewalls
Prevention and detection
Replay Attack
What is asymmetic encryption?
Speech recognition
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests