SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Hacker
Password Crackers
CHAP (Challenge Handshake Authentication Protocol)
Cyberstalking/Harassment
2. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Blacklisting Software
Eavesdropping Attack
Hybird
Drive-by Download
3. A security analysis of the transaction within its approved context.
Authorization
Load balancing
Stateful packet filtering
Content inspection
4. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Federated identity management
Firewall logs
70
Spyware
5. A set of permissions that are attached to an object.
Offline cracking
DLP
ACL
Backup frequency
6. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Root
Bluejacking
Hash encoding
Rootkit
7. These accounts are user accounts that remain active after an employee has left an organization.
Hybird
Biometrics
Mouse Trapping
Orphaned
8. A ____ means that the application or service assigned to that port is listening for any instructions.
Electronic Vandal
RADIUS
Testing
Open Port
9. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Media for backups
Packet tampering
Natural Threat
10. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Backup scope
Authentication
Macro
What is asymmetic encryption?
11. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Black Hat
External Threat
LDAP injection
12. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Eavesdropping Attack
Three-Way Handshake
Phishing
Adware
13. ____ is an image spam that is divided into multiple images.
Cloud computing
Flaming
Mantrap
GIF Layering
14. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Identification
Cognitive biometrics
CCTV
Cloud computing
15. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Rule Based Access Control
Content-Filtering Firewall
Virus
Denial of service attack
16. A form of filtering that blocks only sites specified as harmful.
White Hat
Boot
Bluejacking
Blacklisting Software
17. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
NAT
Adware
LEAP
18. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Electronic Vandal
Token
Rogue
Hoaxes
19. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Virus
Stateful packet filtering
Geometric variance
20. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Hardware Attack
Macro
SYN Flood
Subject
21. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Flashing
Honeypot
Fake Antivirus
Biometrics
22. A firewall capable of monitoring a data stream from end to end.
DAC
Stateful Firewall
Challenge
Electronic Vandal
23. Due to the limitations of online guessing - most password attacks today use ____.
Firewalls
Security
Offline cracking
Reverse proxy
24. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Cognitive biometrics
Physical security access control measures
Script Kiddie
Identity Theft
25. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Content inspection
Fencing
Swiss Cheese
SYN Flood
26. A technique that allows private IP addresses to be used on the public Internet.
NAT
DLP
Hoaxes
Trusted OS
27. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Token
PAT
Port Scanner
DNS
28. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Eavesdropping Attack
Resident
Identity Theft
Physical security
29. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Subject
Flaming
Distributed
Ciphertext
30. A method for confirming users' identities
Macro
Tailgating
Authentication
Spimming
31. People very knowledgeable about computers who use their knowledge to invade other people's computers
Security
Malicious Insiders
Hacker
Offline cracking
32. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Kerberos
Challenge
Swiss Cheese
Loop Protection
33. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Cracker
Distributed Denial of Service (DDoS)
WEP (Wired Equivalent Privacy)
Environmental Threat
34. The weakness of passwords centers on ____.
Adware
Distributed
Human memory
Bluejacking
35. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
TACACS
Bluesnarfing
Mantrap
Session hijacking
36. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
Media for backups
Mouse Trapping
Character
37. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Mouse Trapping
Extreme Humidity
MPack
38. A ____ attack is similar to a passive man-in-the-middle attack.
Environmental Threat
Web security gateway
Cognitive biometrics
Replay
39. Can also capture transmissions that contain passwords.
Spoofing
DLP
Loop Protection
Protocol analyzer
40. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Rainbow Tables
White Hat
Social engineering
ACL
41. A firewall that can block designated types of traffic from entering a protected network.
Content-Filtering Firewall
Server-Side
LEAP
Physical security
42. An authentication process that involves three steps.
UDP Flood
Phishing
Three-Way Handshake
Evil Twin
43. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Identification
Private
Black Hat
Mouse Trapping
44. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
MPack
Rainbow Tables
Shoulder Surfing
Flashing
45. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Role
Digital Certificate
Password
Bluesnarfing
46. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
70
Identification
Extreme temperatures
Malicious Insiders
47. ____ attacks are responsible for half of all malware delivered by Web advertising.
EAP
Password
PAT
Fake Antivirus
48. Password and BioMetric
Logic Bomb
Two factor security
History
Hash encoding
49. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
IEEE 802.1x
ACL (Access Control List)
Geometric variance
Drive-by Download
50. Often used for managing user access to one or more systems.
Rule Based Access Control
Logic Bomb
Replicating
Token