SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Packet filtering
OAuth
Security
Cracker
2. A ____ encrypts all data that is transmitted between the remote device and the network.
VPN
Standard biometrics
Cyberstalking/Harassment
Electronic eavesdropping
3. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Port Scanner
Replicating
Bluejacking
Distributed storage
4. ____ can be prewired for electrical power as well as wired network connections.
White box
Locking Cabinets
TACACS
Root
5. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Content-Filtering Firewall
BioMetric devices
Rule Based Access Control
Biometrics
6. Provides a greater degree of security by implementing port-based authentication.
Wireless VLANs
Extreme temperatures
IEEE 802.1x
LEAP
7. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Rogue
White box
Flaming
Electronic Activist (hacktivist)
8. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cyberbullying
Account expiration
Media for backups
Challenge
9. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Authorization
Private
Social engineering
DAP
10. How secure the data in your backups is-can use physical security or encryption
Authentication
Security
DNS poisoning
Proximity reader
11. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
Blacklisting Software
Stateless Firewall
Trusted OS
12. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Stateless Firewall
WEP (Wired Equivalent Privacy)
White Hat
War Driving
13. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Extreme Humidity
Rootkit
Internal Threat
Testing
14. The process of giving someone permission to do or have something
BioMetric devices
Router
VPN
Authorization
15. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Open Port
Drive-by Download
Rogue
Human memory
16. Holds the promise of reducing the number of usernames and passwords that users must memorize.
SSO
TCP/IP
Backup frequency
Word Splitting
17. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Access Control
Web security gateway
DMS (Demilitarized Zone)
What is asymmetic encryption?
18. A user accessing a computer system must present credentials or ____ when logging on to the system.
Denial of service attack
Identification
Insiders
Black Hat
19. Users who access a Web server are usually restricted to the ____ directory.
Identity management
Fencing
Root
Information security
20. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Eavesdropping Attack
Script Kiddie
Federated identity management
Cracker
21. ____ attacks are responsible for half of all malware delivered by Web advertising.
Amart card
Speech recognition
EAP
Fake Antivirus
22. An attacker slips through a secure area following a legitimate employee.
Logic Bomb
Tailgating
Swiss Cheese
Whaling
23. A form of filtering that blocks only sites specified as harmful.
Root
What is asymmetic encryption?
Fake Antivirus
Blacklisting Software
24. A technique that allows private IP addresses to be used on the public Internet.
Physical security
NAT
Worm
Firewall logs
25. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Identity management
ICMP Flood
Media for backups
26. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Client_Hello
Fake Antivirus
Malicious Insiders
War Driving
27. A ____ attack is similar to a passive man-in-the-middle attack.
Replay
Authentication
DMS (Demilitarized Zone)
Hardware Attack
28. The time it takes for a key to be pressed and then released.
Content inspection
Password Crackers
Dwell Time
History
29. Forwards packets across computer networks.
Testing
History
Router
Protocol analyzer
30. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Distributed Denial of Service (DDoS)
Chain
Hoaxes
Ciphertext
31. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Web security gateway
UDP Flood
Phishing
Standard biometrics
32. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Operation
Stateful packet filtering
Sniffer
Man-made Threat
33. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Open Port
Cipher locks
Hybird
Honeypot
34. A ____ is designed to separate a nonsecured area from a secured area.
Denial of service attack
Distributed Denial of Service (DDoS)
Mantrap
Cognitive biometrics
35. Hides inside other software - usually as an attachment or a downloadable file
What is asymmetic encryption?
Extreme Humidity
Authorization
Trojan-horse virus
36. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Honeypot
Authentication
Distributed storage
Load balancing
37. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
Evil Twin
Mandatory Access Control
GIF Layering
38. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Server-Side
Flashing
Offline cracking
Challenge
39. Due to the limitations of online guessing - most password attacks today use ____.
Offline cracking
Phishing
DNS
Authentication
40. How often you perform your backups (cost-benefit analysis of backing up)
PAT
Backup frequency
Testing
Port Scanner
41. Sifting through a company's garbage to find information to help break into their computers
VPN
Stateless Firewall
Dumpster Diving
Macro
42. Floods a Web site with so many requests for service that it slows down or crashes the site
Word Splitting
Bluejacking
Hardware Attack
Denial of service attack
43. Viruses and worms are said to be self-____.
Fencing
Distributed
LEAP
Replicating
44. Sending high volumes of ICMP (usually ping) packets to a target.
Cognitive biometrics
Locking Cabinets
ICMP Flood
EAP
45. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Cyber Theft
History
Rainbow Tables
Malicious Insiders
46. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Data
Digital Certificate
Virus
LDAP injection
47. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
TACACS
Internal Threat
Client_Hello
Man-made Threat
48. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
UDP Flood
Zone transfer
Biometrics
49. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Hoaxes
Cracker
Account expiration
Physical security access control measures
50. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Honeypot
Man-in-the-Middle Attack
Firewall logs
DNS Log