SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Proximity reader
Client_Hello
CHAP (Challenge Handshake Authentication Protocol)
Black Hat
2. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Spear Phishing
Speech recognition
Worm
Human memory
3. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Cyberterrorist
Cyberbullying
TACACS
Wireless VLANs
4. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Private
Black Hat
Cracker
5. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
SYN Flood
Hybird
Mandatory Access Control
Electronic Activist (hacktivist)
6. The weakness of passwords centers on ____.
Tailgating
Human memory
CardSpace
TCP/IP
7. A pay-per-use computing model in which customers pay only for the computing resources they need.
Clickjacking
Electronic eavesdropping
Cloud computing
Dwell Time
8. Software that can guess passwords
DNS poisoning
Testing
Swiss Cheese
Password Crackers
9. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Role Based Access Control
Electronic Activist (hacktivist)
Rootkit
PAT
10. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
ICMP Flood
RADIUS
Electronic Vandal
Malicious Insiders
11. A method for confirming users' identities
Trusted OS
computer footprint
Packet filtering
Authentication
12. A variety of threats such as viruses - worms - and Trojan horses
Malicious code
Vishing
Standard biometrics
Spoofing
13. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Stateless Firewall
Man-made Threat
Speech recognition
14. A threat that originates from outside the company. (ex. power failure.)
External Threat
Social engineering
Protocol analyzer
Replay
15. A technology that can help to evenly distribute work across a network.
Router
Amart card
Stateless Firewall
Load balancing
16. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Blacklisting Software
Script Kiddie
Brute Force
Dumpster Diving
17. A ____ encrypts all data that is transmitted between the remote device and the network.
Token
Zone transfer
VPN
DNS poisoning
18. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Cyberbullying
Physical security access control measures
Tailgating
Web security gateway
19. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Honeypot
Distributed
Wireless security
Cyberterrorist
20. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Electronic eavesdropping
TACACS
Backup scope
DAP
21. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Swiss Cheese
Password
Replicating
TCP/IP
22. A ____ is a network set up with intentional vulnerabilities.
White Hat
Vishing
Honeynet
Testing
23. It is able to code and decode data
Authorization
Router
Symmetric encryption
Geometric variance
24. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Virus
White Hat
Session hijacking
Logic Bomb
25. People very knowledgeable about computers who use their knowledge to invade other people's computers
Rule Based Access Control
SSO
Hacker
Sniffer
26. A group of piconets in which connections exist between different piconets is called a ____.
GIF Layering
Scatternet
Three-Way Handshake
DNS
27. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Cyberstalking/Harassment
Virus
Environmental Threat
Token
28. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Firewall logs
War Driving
Spimming
Authentication
29. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Two factor security
Flashing
Sniffer
Malicious code
30. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Root
Virtualization
Eavesdropping Attack
Brute Force
31. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
Subject
Man-in-the-Middle Attack
Clickjacking
32. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Scatternet
Eavesdropping Attack
Role Based Access Control
Load balancing
33. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Loop Protection
Mouse Trapping
Packet tampering
Word Splitting
34. Pretending to be another person.
GIF Layering
Hash encoding
Impersonation
Rule Based Access Control
35. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Buffer Overflow
Cyberterrorist
White box
GIF Layering
36. A framework for transporting authentication protocols instead of the authentication protocol itself.
Evil Twin
Adware
EAP
Stateful Firewall
37. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Electronic Vandal
Bluesnarfing
Honeynet
White Hat
38. Content filtering - encryption - firewalls
Prevention and detection
Whaling
PAT
Cyberbullying
39. Related to the perception - thought process - and understanding of the user.
Hybird
Electronic Activist (hacktivist)
Cognitive biometrics
Fencing
40. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
ICMP Flood
Physical security access control measures
Loop Protection
Replay Attack
41. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Identification
Load balancing
Bluejacking
Authentication request
42. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
Buffer Overflow
Replay
Man-in-the-Middle Attack
43. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Roller barrier
Cybercriminals
Chain
Access Control
44. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
LDAP injection
Federated identity management
OAuth
DNS Hijacking
45. Hides inside other software - usually as an attachment or a downloadable file
Electronic Activist (hacktivist)
Cognitive biometrics
Replay
Trojan-horse virus
46. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
computer footprint
Proximity reader
Open Port
Spyware
47. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
External Threat
DNS
Association request
Account expiration
48. A ____ does not serve clients - but instead routes incoming requests to the correct server.
SSO
Replicating
Reverse proxy
Federated identity management
49. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Security
Federated identity management
Trojan-horse virus
50. Often used for managing user access to one or more systems.
Rule Based Access Control
Evil Twin
Authentication
Man-in-the-Middle Attack