SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Three-Way Handshake
Swiss Cheese
DNS
Physical security access control measures
2. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
OAuth
Replay Attack
Script Kiddie
Virus
3. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Boot
War Driving
Cyberstalking/Harassment
ACL
4. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Extreme Humidity
Social engineering
Natural Threat
Token
5. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Root
Authentication request
Flashing
DAC
6. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Mouse Trapping
Internal Threat
Tailgating
Biometrics
7. It is able to code and decode data
Trusted OS
Tailgating
Symmetric encryption
Hoaxes
8. The action that is taken by the subject over the object is called a ____.
Man-made Threat
Operation
DAC
Media for backups
9. Securing a restricted area by erecting a barrier is called ____.
Fake Antivirus
Brute Force
Wireless security
Fencing
10. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Logic Bomb
External Threat
Orphaned
Firewall logs
11. How many past backups you keep - what you did on your machine etc.
History
CCTV
Challenge
Fencing
12. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Testing
Password
Electronic Activist (hacktivist)
Identity management
13. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Hoaxes
Standard biometrics
Honeynet
White box
14. A set of permissions that are attached to an object.
ACL
White Hat
Kerberos
Drive-by Download
15. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Electronic eavesdropping
Cracker
Sniffer
Malicious Insiders
16. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
SYN Flood
Token
Phishing
History
17. Using a single authentication credential that is shared across multiple networks.
Floor Guard
EAP
Stateful packet filtering
Identity management
18. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Amart card
White Hat
Logic Bomb
Subject
19. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
CHAP (Challenge Handshake Authentication Protocol)
Packet filtering
Rainbow Tables
Web security gateway
20. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Trusted OS
Adware
Spoofing
Spear Phishing
21. A ____ is a network set up with intentional vulnerabilities.
ACL
Honeynet
Swiss Cheese
Mantrap
22. Allows a single access point to service different types of users.
Role Based Access Control
Chain
Protocol analyzer
Wireless VLANs
23. A framework for transporting authentication protocols instead of the authentication protocol itself.
Data
Word Splitting
EAP
Content filtering
24. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Wireless VLANs
Cybercriminals
SYN Flood
Environmental Threat
25. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Man-made Threat
Flashing
Character
Scatternet
26. Users who access a Web server are usually restricted to the ____ directory.
Authentication
Encryption
Floor Guard
Root
27. A ____ encrypts all data that is transmitted between the remote device and the network.
Distributed storage
NAT
VPN
Swiss Cheese
28. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
External Threat
Character
Tailgate sensors
Hacker
29. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Session hijacking
Electronic Vandal
Account expiration
Honeypot
30. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Loop Protection
Sniffer
Social engineering
Environmental Threat
31. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Cyber Theft
Virtualization
Resident
Hacker
32. A secret combination of letters - numbers - and/or characters that only the user should know.
BioMetric devices
Password
LDAP injection
Man-made Threat
33. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Firewall logs
LEAP
Macro
Authorization
34. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Spoofing
Extreme temperatures
Honeynet
Stateful packet filtering
35. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Boot
Adware
Scatternet
Reverse proxy
36. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
TACACS
BioMetric devices
Rule Based Access Control
Federated identity management
37. Form of phishing that targets wealthy individuals.
SYN Flood
Whaling
Identification
Macro
38. A user accessing a computer system must present credentials or ____ when logging on to the system.
Digital Certificate
Proximity reader
Identification
Wireless security
39. How secure the data in your backups is-can use physical security or encryption
Firewalls
LDAP injection
Security
Honeypot
40. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Content filtering
Social engineering
Packet tampering
Spoofing
41. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Virus
History
Cipher locks
DLP
42. Viruses and worms are said to be self-____.
Virtualization
ACL (Access Control List)
Cybercriminals
Replicating
43. Could become a key element in authentication in the future.
Cognitive biometrics
LDAP injection
Trojan-horse virus
GIF Layering
44. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Content filtering
Internal Threat
Private
Smurf Attack
45. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Roller barrier
Mantrap
White Hat
Honeypot
46. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Association request
SSO
DMS (Demilitarized Zone)
Physical security
47. The ____ model is the least restrictive.
Cyberstalking/Harassment
DAC
Macro
Content inspection
48. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
PAT
Packet tampering
Flashing
Proximity reader
49. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Vishing
Separation of duties
Internal Threat
Loop Protection
50. Can also capture transmissions that contain passwords.
Social engineering
Clickjacking
TACACS
Protocol analyzer
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests