SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technique that allows private IP addresses to be used on the public Internet.
Rogue
Cognitive biometrics
Zone transfer
NAT
2. Computer crimes involving the theft of money
Fencing
Orphaned
CardSpace
Cyber Theft
3. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Operation
Role Based Access Control
Eavesdropping Attack
Bluejacking
4. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Man-made Threat
RADIUS
Character
Distributed Denial of Service (DDoS)
5. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Proximity reader
Dumpster Diving
Data
What is asymmetic encryption?
6. The process of verifying that your backups actually work
Testing
Denial of service attack
Physical security access control measures
CCTV
7. A ____ attack is similar to a passive man-in-the-middle attack.
Content-Filtering Firewall
Security
Wireless VLANs
Replay
8. Form of phishing that targets wealthy individuals.
Whaling
Content-Filtering Firewall
Encryption
Biometrics
9. An attacker slips through a secure area following a legitimate employee.
Offline cracking
Hash encoding
Tailgating
Cyberterrorist
10. Below 40% or above 50%
Logic Bomb
Extreme Humidity
UDP Flood
Cybercriminals
11. The weakness of passwords centers on ____.
Smurf Attack
Security
Human memory
Adware
12. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
CardSpace
Buffer Overflow
Tailgate sensors
What is asymmetic encryption?
13. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Packet tampering
Cyberstalking/Harassment
DNS
Separation of duties
14. Small electronic devices that change user passwords automatically
Token
DMS (Demilitarized Zone)
Backup frequency
LDAP injection
15. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Identity management
ICMP Flood
Man-in-the-Middle Attack
Chain
16. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
DAC
Adware
Whaling
Role Based Access Control
17. The most restrictive access control model is ____.
Shoulder Surfing
Mandatory Access Control
Authentication request
Token
18. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Standard biometrics
70
Eavesdropping Attack
Cyberbullying
19. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
VPN
Tailgate sensors
Man-made Threat
Blacklisting Software
20. An attack that forces a user to unintentionally click a link.
Information security
ICMP Flood
Clickjacking
Association request
21. Floods a Web site with so many requests for service that it slows down or crashes the site
Extreme temperatures
Blacklisting Software
WEP (Wired Equivalent Privacy)
Denial of service attack
22. A private key and public key
Adware
What is asymmetic encryption?
Internal Threat
Extreme temperatures
23. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Resident
Fake Antivirus
DNS Log
DAP
24. Web application attacks are considered ____ attacks.
Malicious code
PAT
Macro
Server-Side
25. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
OAuth
Proximity reader
Identity management
CCTV
26. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
DMS (Demilitarized Zone)
Authentication request
War Driving
27. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Macro
MPack
DAP
CardSpace
28. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Worm
Role Based Access Control
Biometrics
Flashing
29. It is able to code and decode data
Mantrap
Bluesnarfing
Cognitive biometrics
Symmetric encryption
30. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Rootkit
Data
LDAP injection
Blacklisting Software
31. A form of filtering that blocks only sites specified as harmful.
Smurf Attack
Dumpster Diving
Blacklisting Software
Drive-by Download
32. Password and BioMetric
Rule Based Access Control
Denial of service attack
IEEE 802.1x
Two factor security
33. Due to the limitations of online guessing - most password attacks today use ____.
Human memory
Macro
Cyberstalking/Harassment
Offline cracking
34. Provides a greater degree of security by implementing port-based authentication.
Content inspection
Session hijacking
IEEE 802.1x
Role Based Access Control
35. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Port Scanner
Subject
Loop Protection
36. A firewall capable of monitoring a data stream from end to end.
Zone transfer
Ciphertext
Kerberos
Stateful Firewall
37. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Dumpster Diving
Reverse proxy
Bluesnarfing
Prevention and detection
38. Content filtering - encryption - firewalls
Environmental Threat
Firewall logs
Prevention and detection
Hacker
39. Broadcast storms can be prevented with ____.
Bluesnarfing
Brute Force Attack
Wireless security
Loop Protection
40. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Federated identity management
War Driving
Electronic eavesdropping
Eavesdropping Attack
41. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Private
Locking Cabinets
Hybird
Port Scanner
42. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Content inspection
DNS
Replay
Two factor security
43. Forwards packets across computer networks.
Denial of service attack
Resident
Router
Load balancing
44. Viruses and worms are said to be self-____.
Content filtering
Authentication request
Replay
Replicating
45. A variety of threats such as viruses - worms - and Trojan horses
computer footprint
Malicious code
NAT
Trusted OS
46. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Trojan-horse virus
DMS (Demilitarized Zone)
Phishing
Web security gateway
47. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Smurf Attack
Loop Protection
Spear Phishing
Separation of duties
48. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Word Splitting
Identity management
IEEE 802.1x
Access Control
49. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Federated identity management
Separation of duties
Bluesnarfing
Zone transfer
50. Pretending to be another person.
OAuth
Impersonation
Role Based Access Control
Buffer Overflow