SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
History
CardSpace
Wireless security
DNS Log
2. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Spoofing
Account expiration
Buffer Overflow
3. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
VPN
NAT
Dumpster Diving
Flaming
4. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Character
DLP
ICMP Flood
Federated identity management
5. Securing a restricted area by erecting a barrier is called ____.
Macro
Fencing
Honeypot
Whaling
6. Form of phishing that targets wealthy individuals.
Stateless Firewall
Flashing
Electronic eavesdropping
Whaling
7. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Packet tampering
Brute Force Attack
Buffer Overflow
Logic Bomb
8. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Bluejacking
Floor Guard
Flaming
Cybercriminals
9. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Cyber Theft
Floor Guard
SYN Flood
VPN
10. A framework for transporting authentication protocols instead of the authentication protocol itself.
Word Splitting
Operation
Denial of service attack
EAP
11. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Character
RADIUS
DAP
Access Control
12. ____ can be prewired for electrical power as well as wired network connections.
Spear Phishing
Locking Cabinets
70
Scatternet
13. Sending high volumes of UDP requests to a target.
Locking Cabinets
Client_Hello
UDP Flood
Phishing
14. Users who access a Web server are usually restricted to the ____ directory.
Hybird
Bluejacking
Root
WEP (Wired Equivalent Privacy)
15. Ensures that messages are not corrupt or tampered with
External Threat
Hash encoding
Open Port
Hoaxes
16. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Electronic eavesdropping
Cognitive biometrics
CCTV
Digital Certificate
17. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Geometric variance
Mandatory Access Control
Worm
Swiss Cheese
18. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Vishing
EAP
ACL (Access Control List)
Resident
19. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Man-made Threat
Separation of duties
Hardware Attack
Natural Threat
20. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Bluejacking
Cracker
DNS Hijacking
Information security
21. When organizations use software that filters content to prevent the transmission of unauthorized information
Rogue
VPN
Content filtering
Hash encoding
22. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Bluesnarfing
Digital Certificate
Symmetric encryption
Authentication request
23. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Three-Way Handshake
Distributed storage
Authentication request
Open Port
24. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Honeypot
Web security gateway
Stateful Firewall
25. ____ is an image spam that is divided into multiple images.
Client_Hello
RADIUS
External Threat
GIF Layering
26. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Bluesnarfing
NAT
Protocol analyzer
Standard biometrics
27. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Cipher locks
Roller barrier
Chain
Loop Protection
28. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
OAuth
Adware
MPack
Insiders
29. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
CHAP (Challenge Handshake Authentication Protocol)
Cyberstalking/Harassment
Replay
Zone transfer
30. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
IEEE 802.1x
Honeynet
Offline cracking
Replay Attack
31. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Flashing
Rootkit
Password Crackers
Geometric variance
32. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Distributed
Cyberbullying
Phishing
Rogue
33. Content filtering - encryption - firewalls
Prevention and detection
Mandatory Access Control
Packet tampering
Replay
34. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Hash encoding
Trojan-horse virus
LDAP injection
SSO
35. A program that is automatically downloaded to your computer without your consent or even your knowledge.
70
Rootkit
Geometric variance
Drive-by Download
36. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Private
Chain
Tailgating
LDAP injection
37. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Environmental Threat
DNS Hijacking
Access Control
Identification
38. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Identification
SSO
Brute Force Attack
Physical security access control measures
39. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Hacker
Mantrap
Reverse proxy
Sniffer
40. A set of permissions that are attached to an object.
Trusted OS
Stateless Firewall
Extreme Humidity
ACL
41. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
War Driving
TCP/IP
Cybercriminals
ICMP Flood
42. A ____ encrypts all data that is transmitted between the remote device and the network.
Testing
LEAP
70
VPN
43. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
Rainbow Tables
Offline cracking
Trojan-horse virus
44. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Three-Way Handshake
DNS
Environmental Threat
Spimming
45. The process of giving someone permission to do or have something
Packet filtering
ACL
Data
Authorization
46. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Hoaxes
Firewalls
CHAP (Challenge Handshake Authentication Protocol)
What is asymmetic encryption?
47. Computer crimes involving the theft of money
Two factor security
Resident
Offline cracking
Cyber Theft
48. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Spyware
Web security gateway
Man-in-the-Middle Attack
Bluejacking
49. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
70
Boot
Spear Phishing
Brute Force
50. A firewall capable of monitoring a data stream from end to end.
Identity Theft
Firewall logs
Man-in-the-Middle Attack
Stateful Firewall