SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Form of phishing that targets wealthy individuals.
Character
Whaling
Black Hat
Flaming
2. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Geometric variance
Separation of duties
Trusted OS
Cracker
3. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Rootkit
computer footprint
Insiders
Security
4. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Stateless Firewall
ARP Poisoning
MPack
Cloud computing
5. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
Digital Certificate
Ciphertext
DNS
6. The action that is taken by the subject over the object is called a ____.
Zone transfer
Honeynet
LEAP
Operation
7. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Roller barrier
Replay
Insiders
Tailgate sensors
8. The most restrictive access control model is ____.
Mandatory Access Control
Physical security
Malicious code
Worm
9. The process of giving someone permission to do or have something
Authorization
Role Based Access Control
Honeypot
CCTV
10. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Content-Filtering Firewall
Firewalls
Authentication request
White Hat
11. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Trojan-horse virus
Physical security
Encryption
12. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Distributed storage
Malicious Insiders
Offline cracking
Content-Filtering Firewall
13. Four interrelated aspects to _________:Access - data - infrastructure - computers
History
DAC
Boot
Physical security
14. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
TCP/IP
Security
Environmental Threat
15. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Replay
Adware
LEAP
Amart card
16. A private key and public key
DNS Hijacking
What is asymmetic encryption?
CHAP (Challenge Handshake Authentication Protocol)
TACACS
17. The ____ model is the least restrictive.
Cipher locks
Server-Side
DAC
NAT
18. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Malicious code
Subject
Virus
DLP
19. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Bluesnarfing
CardSpace
Encryption
Buffer Overflow
20. It accepts spoken words for input as if they had been typed on the keyboard.
Malicious Insiders
Speech recognition
Electronic Activist (hacktivist)
Human memory
21. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
History
Shoulder Surfing
Cyberterrorist
Denial of service attack
22. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Content inspection
Rogue
Hybird
Fake Antivirus
23. A technique that allows private IP addresses to be used on the public Internet.
NAT
Dumpster Diving
Protocol analyzer
Sniffer
24. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Virtualization
PAT
Hardware Attack
Content-Filtering Firewall
25. A ____ attack is similar to a passive man-in-the-middle attack.
computer footprint
Cyberstalking/Harassment
Replay
Character
26. Lock - conduit - card key - video equipment - secured guard
OAuth
Firewalls
Standard biometrics
Physical security access control measures
27. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Stateless Firewall
Virtualization
Password
Loop Protection
28. ____ involves horizontally separating words - although it is still readable by the human eye.
Bluejacking
Session hijacking
Word Splitting
Tailgate sensors
29. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Flaming
Orphaned
Honeypot
Association request
30. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Authorization
Mandatory Access Control
Character
Physical security access control measures
31. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Man-made Threat
Subject
Honeypot
Cracker
32. Software that can guess passwords
Drive-by Download
Password Crackers
Role
Rainbow Tables
33. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Stateful packet filtering
Ciphertext
Geometric variance
Swiss Cheese
34. An attack that forces a user to unintentionally click a link.
Load balancing
Media for backups
Clickjacking
Three-Way Handshake
35. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
DNS poisoning
Cyberterrorist
Backup frequency
Separation of duties
36. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
External Threat
Electronic Vandal
Cipher locks
IEEE 802.1x
37. A technology that can help to evenly distribute work across a network.
Tailgate sensors
Scatternet
Mouse Trapping
Load balancing
38. Below 40% or above 50%
Extreme Humidity
Two factor security
Operation
Mouse Trapping
39. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
White box
Hash encoding
MPack
40. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Private
Symmetric encryption
Cracker
Federated identity management
41. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
DAC
Geometric variance
Access Control
Malicious code
42. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Stateful Firewall
Mouse Trapping
Fake Antivirus
Access Control
43. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Access Control
Symmetric encryption
Data
Bluejacking
44. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Malicious Insiders
DLP
DMS (Demilitarized Zone)
Replicating
45. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Rainbow Tables
War Driving
Cipher locks
Social engineering
46. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Roller barrier
RADIUS
Man-made Threat
Whaling
47. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Fake Antivirus
Hacker
Swiss Cheese
Brute Force
48. A set of permissions that are attached to an object.
Mouse Trapping
Wireless security
ACL
Rule Based Access Control
49. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Rule Based Access Control
Buffer Overflow
Separation of duties
CCTV
50. ____ can be prewired for electrical power as well as wired network connections.
Locking Cabinets
Hash encoding
Black Hat
Virus