SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
Bluejacking
Adware
DAP
2. Set of rules that allow or deny traffic
MPack
Proximity reader
Packet filtering
Federated identity management
3. A private key and public key
Phishing
Geometric variance
What is asymmetic encryption?
Whaling
4. An attacker motivated by the ideology to attack computer or infrastructure networks.
Geometric variance
Vishing
Cyberterrorist
Boot
5. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Eavesdropping Attack
Worm
MPack
NAT
6. Provides a greater degree of security by implementing port-based authentication.
IEEE 802.1x
Stateless Firewall
Smurf Attack
Flashing
7. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Access Control
Chain
Token
Word Splitting
8. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Information security
Proximity reader
Content inspection
PAT
9. Below 40% or above 50%
Script Kiddie
Wireless security
Locking Cabinets
Extreme Humidity
10. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Mandatory Access Control
Web security gateway
ACL (Access Control List)
Orphaned
11. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Word Splitting
OAuth
Black Hat
Hardware Attack
12. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Hoaxes
DMS (Demilitarized Zone)
Sniffer
CCTV
13. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Cognitive biometrics
SYN Flood
Distributed Denial of Service (DDoS)
Ciphertext
14. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
PAT
Prevention and detection
Role
Resident
15. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Cyberstalking/Harassment
Standard biometrics
Buffer Overflow
Physical security access control measures
16. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
PAT
Roller barrier
RADIUS
Rootkit
17. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Password
TCP/IP
Proximity reader
Blacklisting Software
18. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Swiss Cheese
Word Splitting
Adware
Replay Attack
19. Computer crimes involving the theft of money
Virtualization
Challenge
Replicating
Cyber Theft
20. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Brute Force Attack
Backup scope
Cybercriminals
Script Kiddie
21. Four interrelated aspects to _________:Access - data - infrastructure - computers
GIF Layering
Web security gateway
Testing
Physical security
22. Scrambles information into an alternative form that requires a key or password to decrypt the information
Encryption
Brute Force Attack
Clickjacking
Character
23. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
DAC
Flashing
Authorization
History
24. Requires mutual authentication used for WLAN encryption using Cisco client software.
IEEE 802.1x
DMS (Demilitarized Zone)
Association request
LEAP
25. Related to the perception - thought process - and understanding of the user.
Backup frequency
Cognitive biometrics
Account expiration
Packet filtering
26. Floods a Web site with so many requests for service that it slows down or crashes the site
Federated identity management
Denial of service attack
Roller barrier
DNS
27. A set of permissions that are attached to an object.
ACL
Blacklisting Software
Word Splitting
Backup scope
28. It accepts spoken words for input as if they had been typed on the keyboard.
Scatternet
Swiss Cheese
Speech recognition
Physical security access control measures
29. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Swiss Cheese
Shoulder Surfing
Word Splitting
TACACS
30. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Amart card
Backup scope
OAuth
Stateless Firewall
31. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Natural Threat
CCTV
Standard biometrics
UDP Flood
32. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Replay
Shoulder Surfing
Internal Threat
Boot
33. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Cyberterrorist
Client_Hello
Security
Offline cracking
34. Software that can guess passwords
Password Crackers
Cipher locks
Mantrap
Port Scanner
35. The ____ model is the least restrictive.
Fencing
DMS (Demilitarized Zone)
Internal Threat
DAC
36. A form of filtering that blocks only sites specified as harmful.
Bluejacking
Blacklisting Software
ARP Poisoning
Rootkit
37. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP Poisoning
Logic Bomb
Mouse Trapping
Kerberos
38. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Virtualization
Geometric variance
Password Crackers
CHAP (Challenge Handshake Authentication Protocol)
39. Sifting through a company's garbage to find information to help break into their computers
Data
Dumpster Diving
Offline cracking
TCP/IP
40. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Role Based Access Control
Packet tampering
Open Port
Firewall logs
41. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Shoulder Surfing
Chain
Tailgate sensors
Electronic Activist (hacktivist)
42. A group of piconets in which connections exist between different piconets is called a ____.
Virtualization
Honeynet
IEEE 802.1x
Scatternet
43. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Flaming
Hacker
Bluejacking
Wireless security
44. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
Electronic Vandal
Eavesdropping Attack
computer footprint
45. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Smurf Attack
Physical security
Shoulder Surfing
Spear Phishing
46. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Cipher locks
Natural Threat
Tailgate sensors
Private
47. The weakness of passwords centers on ____.
Eavesdropping Attack
Human memory
SYN Flood
BioMetric devices
48. Indicates when an account is no longer active.
Firewalls
Account expiration
Resident
VPN
49. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Mouse Trapping
Eavesdropping Attack
Packet tampering
Identity management
50. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Separation of duties
Electronic Activist (hacktivist)
Insiders
Content filtering