SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Cracker
Spyware
Virtualization
Rule Based Access Control
2. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
DAC
Client_Hello
Virtualization
Bluejacking
3. Forwards packets across computer networks.
Router
Flashing
Hybird
Security
4. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Vishing
Cipher locks
Spyware
Logic Bomb
5. Could become a key element in authentication in the future.
Hybird
computer footprint
Backup scope
Cognitive biometrics
6. An attack that forces a user to unintentionally click a link.
DNS Hijacking
Clickjacking
TCP/IP
Identity Theft
7. It accepts spoken words for input as if they had been typed on the keyboard.
Distributed
Role Based Access Control
Roller barrier
Speech recognition
8. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
DNS
Black Hat
Account expiration
9. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Honeypot
Stateful Firewall
Spyware
Script Kiddie
10. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Hacker
Smurf Attack
Prevention and detection
Backup frequency
11. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Brute Force Attack
Blacklisting Software
Spimming
Speech recognition
12. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Distributed storage
Natural Threat
Hash encoding
PAT
13. A form of filtering that blocks only sites specified as harmful.
Load balancing
Stateless Firewall
Blacklisting Software
DNS
14. Provides a greater degree of security by implementing port-based authentication.
Rule Based Access Control
What is asymmetic encryption?
Scatternet
IEEE 802.1x
15. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
DNS
Man-in-the-Middle Attack
Subject
Cyberbullying
16. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Cracker
TACACS
NAT
Access Control
17. Using a single authentication credential that is shared across multiple networks.
Cybercriminals
Identity management
ARP Poisoning
Cognitive biometrics
18. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
DMS (Demilitarized Zone)
Worm
Swiss Cheese
DNS Hijacking
19. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Electronic eavesdropping
Backup frequency
EAP
Rootkit
20. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
RADIUS
DNS
Cyberbullying
21. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Information security
Hardware Attack
Distributed
CCTV
22. How often you perform your backups (cost-benefit analysis of backing up)
Trusted OS
Backup frequency
Cyberterrorist
TCP/IP
23. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
MPack
Kerberos
Shoulder Surfing
Server-Side
24. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Speech recognition
DNS poisoning
Identity management
Logic Bomb
25. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Open Port
Proximity reader
PAT
Distributed
26. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Virtualization
Physical security access control measures
Media for backups
CardSpace
27. When organizations use software that filters content to prevent the transmission of unauthorized information
Bluesnarfing
Content filtering
Boot
Stateful Firewall
28. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Separation of duties
Electronic Vandal
Vishing
DAP
29. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Tailgating
Cipher locks
Proximity reader
CHAP (Challenge Handshake Authentication Protocol)
30. Below 40% or above 50%
Extreme Humidity
DNS Log
Token
Content-Filtering Firewall
31. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Bluesnarfing
Replicating
OAuth
Operation
32. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
Standard biometrics
Brute Force
Identity Theft
33. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Shoulder Surfing
Firewalls
Symmetric encryption
Man-in-the-Middle Attack
34. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
DNS poisoning
Separation of duties
Rogue
Router
35. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Two factor security
Account expiration
Honeypot
Loop Protection
36. Can create entries in a log for all queries that are received.
Cipher locks
Cyber Theft
DNS Log
Trojan-horse virus
37. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Private
Stateful packet filtering
Hash encoding
Speech recognition
38. A firewall that can block designated types of traffic from entering a protected network.
UDP Flood
Content-Filtering Firewall
Evil Twin
Port Scanner
39. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Man-made Threat
Dumpster Diving
Natural Threat
Amart card
40. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
VPN
Boot
Rogue
PAT
41. Wants to cause as much damage as possible - without a particular target or goal.
GIF Layering
Human memory
Ciphertext
Electronic Vandal
42. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Stateful Firewall
Brute Force
CHAP (Challenge Handshake Authentication Protocol)
43. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Distributed Denial of Service (DDoS)
Physical security
SSO
70
44. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Virtualization
Boot
Brute Force Attack
Backup scope
45. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Rainbow Tables
Cognitive biometrics
Virus
Stateless Firewall
46. The action that is taken by the subject over the object is called a ____.
Token
SSO
Operation
Session hijacking
47. A user under Role Based Access Control can be assigned only one ____.
Identity Theft
Cyber Theft
Role
Brute Force Attack
48. Related to the perception - thought process - and understanding of the user.
Content filtering
Cognitive biometrics
MPack
White box
49. A security analysis of the transaction within its approved context.
Federated identity management
LDAP injection
Content inspection
Hacker
50. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Fencing
Proximity reader
Router