SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Indicates when an account is no longer active.
computer footprint
Account expiration
Mantrap
SSO
2. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
Load balancing
Content inspection
Trusted OS
3. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Electronic eavesdropping
Authentication request
Stateful Firewall
BioMetric devices
4. A ____ attack is similar to a passive man-in-the-middle attack.
Bluesnarfing
Bluejacking
Replay
ARP Poisoning
5. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Mantrap
Backup frequency
Content filtering
ACL (Access Control List)
6. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Spear Phishing
ICMP Flood
Fake Antivirus
DMS (Demilitarized Zone)
7. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
Flashing
Symmetric encryption
Drive-by Download
8. It accepts spoken words for input as if they had been typed on the keyboard.
Brute Force
Data
SSO
Speech recognition
9. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
MPack
Challenge
Virus
OAuth
10. Web application attacks are considered ____ attacks.
Server-Side
Mandatory Access Control
SSO
Resident
11. Form of phishing that targets wealthy individuals.
Identity management
LDAP injection
Fake Antivirus
Whaling
12. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Insiders
Hardware Attack
Spoofing
Data
13. Often used for managing user access to one or more systems.
Extreme temperatures
Encryption
Rule Based Access Control
Mantrap
14. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Roller barrier
Cybercriminals
Adware
Private
15. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Distributed Denial of Service (DDoS)
Account expiration
Firewalls
Two factor security
16. A secret combination of letters - numbers - and/or characters that only the user should know.
Spyware
Distributed storage
Password
Tailgating
17. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
DNS Hijacking
Cyber Theft
Bluesnarfing
DNS poisoning
18. A ____ encrypts all data that is transmitted between the remote device and the network.
Port Scanner
Firewalls
VPN
DLP
19. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Worm
Packet filtering
CardSpace
Cyberstalking/Harassment
20. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Floor Guard
Bluejacking
UDP Flood
Bluesnarfing
21. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Information security
Man-made Threat
Access Control
Mantrap
22. Using a single authentication credential that is shared across multiple networks.
SSO
Identity management
Environmental Threat
Dumpster Diving
23. A group of piconets in which connections exist between different piconets is called a ____.
Scatternet
Cognitive biometrics
Mantrap
Packet tampering
24. The weakness of passwords centers on ____.
Human memory
Encryption
Malicious Insiders
Bluesnarfing
25. A threat that originates from outside the company. (ex. power failure.)
Fake Antivirus
Hardware Attack
Open Port
External Threat
26. These accounts are user accounts that remain active after an employee has left an organization.
External Threat
Replay Attack
Orphaned
Reverse proxy
27. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Dumpster Diving
Role Based Access Control
IEEE 802.1x
Rootkit
28. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Encryption
Password Crackers
Media for backups
Reverse proxy
29. A ____ is designed to separate a nonsecured area from a secured area.
Mantrap
Electronic Activist (hacktivist)
Logic Bomb
Smurf Attack
30. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Physical security access control measures
Insiders
Replay Attack
Federated identity management
31. A firewall that can block designated types of traffic from entering a protected network.
Content-Filtering Firewall
Resident
ICMP Flood
Vishing
32. How many past backups you keep - what you did on your machine etc.
Account expiration
Smurf Attack
History
Mouse Trapping
33. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Hardware Attack
OAuth
Scatternet
Virtualization
34. Computer crimes involving the theft of money
Proximity reader
Content inspection
Cyber Theft
LDAP injection
35. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
MPack
OAuth
Rule Based Access Control
Malicious Insiders
36. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
LDAP injection
Malicious code
Honeypot
Script Kiddie
37. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Hybird
Hardware Attack
Scatternet
Blacklisting Software
38. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Three-Way Handshake
Spear Phishing
Impersonation
39. ____ can be prewired for electrical power as well as wired network connections.
Operation
Identification
Internal Threat
Locking Cabinets
40. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Distributed storage
Boot
Cyberterrorist
Man-in-the-Middle Attack
41. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Offline cracking
Two factor security
Cracker
Mouse Trapping
42. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Honeypot
DNS
OAuth
Man-made Threat
43. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Password
Whaling
ARP Poisoning
White box
44. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Load balancing
Hybird
Cyberbullying
Electronic Activist (hacktivist)
45. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Testing
Honeynet
LEAP
Tailgate sensors
46. Requires mutual authentication used for WLAN encryption using Cisco client software.
Wireless VLANs
Malicious code
LEAP
Load balancing
47. An attack that forces a user to unintentionally click a link.
DAC
TCP/IP
Honeynet
Clickjacking
48. The process of verifying that your backups actually work
Bluejacking
Human memory
ICMP Flood
Testing
49. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Swiss Cheese
Replicating
Web security gateway
LDAP injection
50. A technique for crashing by sending too much data to the buffer in a comuter's memory
Token
DLP
Buffer Overflow
Rule Based Access Control