SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Media for backups
Internal Threat
Word Splitting
RADIUS
2. A firewall capable of monitoring a data stream from end to end.
Role
Identity management
DNS Hijacking
Stateful Firewall
3. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Hardware Attack
Extreme temperatures
ACL
Shoulder Surfing
4. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Authentication request
Fencing
70
Amart card
5. Viruses and worms are said to be self-____.
Hybird
Content-Filtering Firewall
Man-made Threat
Replicating
6. An attacker slips through a secure area following a legitimate employee.
Backup scope
Hybird
Drive-by Download
Tailgating
7. ____ can be prewired for electrical power as well as wired network connections.
Locking Cabinets
Eavesdropping Attack
SSO
Buffer Overflow
8. A threat that originates from outside the company. (ex. power failure.)
External Threat
Extreme Humidity
Load balancing
Testing
9. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Bluejacking
Symmetric encryption
Drive-by Download
Roller barrier
10. Can create entries in a log for all queries that are received.
Association request
Content inspection
Eavesdropping Attack
DNS Log
11. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Role Based Access Control
Chain
Vishing
Shoulder Surfing
12. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Malicious code
Trusted OS
Association request
EAP
13. Indicates when an account is no longer active.
DAC
Account expiration
Worm
Biometrics
14. Broadcast storms can be prevented with ____.
Hoaxes
Private
Loop Protection
Malicious Insiders
15. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Brute Force
CCTV
Packet filtering
Wireless VLANs
16. Can be used to determine whether new IP addresses are attempting to probe the network.
Replay
Security
Packet filtering
Firewall logs
17. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
RADIUS
Insiders
Bluesnarfing
Brute Force Attack
18. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
CHAP (Challenge Handshake Authentication Protocol)
Identity management
Token
19. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
VPN
Rogue
WEP (Wired Equivalent Privacy)
Flaming
20. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Separation of duties
Proximity reader
Media for backups
Rainbow Tables
21. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Three-Way Handshake
Loop Protection
Character
Rogue
22. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Resident
Wireless security
Rule Based Access Control
Shoulder Surfing
23. Wants to cause as much damage as possible - without a particular target or goal.
Man-in-the-Middle Attack
Load balancing
Electronic Vandal
Brute Force
24. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Chain
Zone transfer
DMS (Demilitarized Zone)
ARP Poisoning
25. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Distributed storage
Blacklisting Software
Client_Hello
Fake Antivirus
26. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Hybird
Virus
Fencing
Three-Way Handshake
27. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
Mantrap
Vishing
Digital Certificate
28. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Content filtering
Macro
Eavesdropping Attack
Standard biometrics
29. Floods a Web site with so many requests for service that it slows down or crashes the site
Ciphertext
Denial of service attack
Operation
Clickjacking
30. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Federated identity management
Resident
Geometric variance
Identity management
31. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Vishing
Stateless Firewall
Two factor security
Role Based Access Control
32. Hides inside other software - usually as an attachment or a downloadable file
Honeynet
ACL
Symmetric encryption
Trojan-horse virus
33. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
OAuth
Vishing
CardSpace
Malicious Insiders
34. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
Electronic eavesdropping
TACACS
Encryption
35. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Cyber Theft
Cracker
LDAP injection
Swiss Cheese
36. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Identity Theft
Rogue
Floor Guard
Content-Filtering Firewall
37. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Rainbow Tables
Content filtering
Dwell Time
Proximity reader
38. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Biometrics
Token
Amart card
Session hijacking
39. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Account expiration
Backup scope
Spimming
Malicious Insiders
40. A user accessing a computer system must present credentials or ____ when logging on to the system.
ACL
Role Based Access Control
Boot
Identification
41. People very knowledgeable about computers who use their knowledge to invade other people's computers
Bluesnarfing
External Threat
Hacker
Bluejacking
42. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
LDAP injection
Bluejacking
Trojan-horse virus
Natural Threat
43. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cyberbullying
DNS Log
Cracker
CardSpace
44. Pretending to be another person.
Clickjacking
Cipher locks
Impersonation
Adware
45. Requires mutual authentication used for WLAN encryption using Cisco client software.
LEAP
Cyberstalking/Harassment
MPack
Bluejacking
46. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Proximity reader
Man-in-the-Middle Attack
Electronic eavesdropping
Resident
47. Below 40% or above 50%
Firewalls
Subject
Hybird
Extreme Humidity
48. How often you perform your backups (cost-benefit analysis of backing up)
Backup frequency
Cybercriminals
Ciphertext
Authorization
49. Users who access a Web server are usually restricted to the ____ directory.
Root
Digital Certificate
Identity management
Roller barrier
50. The ____ model is the least restrictive.
Bluejacking
DAC
Electronic Vandal
Scatternet