SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
SYN Flood
CardSpace
Speech recognition
WEP (Wired Equivalent Privacy)
2. Viruses and worms are said to be self-____.
Chain
Router
Replicating
Data
3. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Wireless VLANs
Rogue
Logic Bomb
Separation of duties
4. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Backup frequency
70
Cipher locks
War Driving
5. A secret combination of letters - numbers - and/or characters that only the user should know.
What is asymmetic encryption?
Password
Rootkit
Insiders
6. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Client_Hello
Man-made Threat
Script Kiddie
Buffer Overflow
7. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Eavesdropping Attack
Packet tampering
Hash encoding
Identity Theft
8. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Mantrap
Digital Certificate
Human memory
Internal Threat
9. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Logic Bomb
Testing
Hardware Attack
Reverse proxy
10. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Social engineering
DAP
DLP
Root
11. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Virtualization
Bluejacking
DNS Hijacking
Script Kiddie
12. Ensures that messages are not corrupt or tampered with
GIF Layering
Hash encoding
TACACS
Proximity reader
13. The process of giving someone permission to do or have something
DAC
Token
Natural Threat
Authorization
14. Set of rules that allow or deny traffic
Wireless security
Man-in-the-Middle Attack
Wireless VLANs
Packet filtering
15. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Blacklisting Software
Biometrics
Cyber Theft
Electronic eavesdropping
16. A variety of threats such as viruses - worms - and Trojan horses
LDAP injection
Vishing
Rogue
Malicious code
17. A private key and public key
Man-made Threat
War Driving
ACL
What is asymmetic encryption?
18. Sending high volumes of ICMP (usually ping) packets to a target.
Roller barrier
WEP (Wired Equivalent Privacy)
ICMP Flood
Proximity reader
19. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
Electronic eavesdropping
Distributed storage
Worm
20. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Social engineering
Cloud computing
Man-made Threat
Protocol analyzer
21. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Challenge
Smurf Attack
Wireless security
GIF Layering
22. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
External Threat
Router
CHAP (Challenge Handshake Authentication Protocol)
Natural Threat
23. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
WEP (Wired Equivalent Privacy)
Smurf Attack
Ciphertext
Rainbow Tables
24. Computer crimes involving the theft of money
Biometrics
Session hijacking
Authorization
Cyber Theft
25. These attacks may allow an attacker to construct LDAP statements based on user input statements.
LDAP injection
DAP
Security
Firewall logs
26. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Packet filtering
Bluejacking
SYN Flood
Content-Filtering Firewall
27. Form of phishing that targets wealthy individuals.
Symmetric encryption
Spimming
Stateful packet filtering
Whaling
28. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
Role Based Access Control
Locking Cabinets
WEP (Wired Equivalent Privacy)
29. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
IEEE 802.1x
Electronic Vandal
Hybird
SSO
30. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Information security
Stateful Firewall
Extreme Humidity
Testing
31. A firewall capable of monitoring a data stream from end to end.
Stateful Firewall
Private
Distributed storage
Ciphertext
32. An AP that is set up by an attacker.
Scatternet
Evil Twin
Distributed Denial of Service (DDoS)
Protocol analyzer
33. ____ can be prewired for electrical power as well as wired network connections.
Bluesnarfing
Speech recognition
Malicious code
Locking Cabinets
34. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Router
Vishing
White Hat
Logic Bomb
35. Users who access a Web server are usually restricted to the ____ directory.
Root
Electronic Vandal
TACACS
Information security
36. A ____ means that the application or service assigned to that port is listening for any instructions.
Ciphertext
Open Port
Authorization
Extreme Humidity
37. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
Server-Side
Reverse proxy
Clickjacking
38. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Spyware
Resident
Flashing
Separation of duties
39. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Two factor security
Tailgating
Brute Force Attack
Amart card
40. A security analysis of the transaction within its approved context.
Brute Force
Packet tampering
Content inspection
Cloud computing
41. A threat that originates from outside the company. (ex. power failure.)
White Hat
Distributed
IEEE 802.1x
External Threat
42. ____ is an image spam that is divided into multiple images.
Smurf Attack
GIF Layering
Social engineering
Backup scope
43. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Cybercriminals
Flashing
Web security gateway
Hardware Attack
44. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
DNS Hijacking
Data
Association request
Floor Guard
45. The time it takes for a key to be pressed and then released.
Phishing
Malicious code
CardSpace
Dwell Time
46. A pay-per-use computing model in which customers pay only for the computing resources they need.
Rootkit
Trusted OS
Spyware
Cloud computing
47. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Replicating
Separation of duties
Physical security access control measures
Rootkit
48. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Impersonation
CCTV
Macro
Man-in-the-Middle Attack
49. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Media for backups
Standard biometrics
Root
Web security gateway
50. It is able to code and decode data
Symmetric encryption
Packet filtering
DAC
DNS Log