SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Set of rules that allow or deny traffic
Packet filtering
Swiss Cheese
Sniffer
DAP
2. Users who access a Web server are usually restricted to the ____ directory.
Malicious code
Bluesnarfing
SSO
Root
3. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Extreme temperatures
Private
Identification
Identity management
4. An attacker slips through a secure area following a legitimate employee.
Extreme Humidity
Replicating
Tailgating
Wireless VLANs
5. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Wireless security
Identification
Association request
Buffer Overflow
6. An attacker motivated by the ideology to attack computer or infrastructure networks.
Smurf Attack
Orphaned
Natural Threat
Cyberterrorist
7. How often you perform your backups (cost-benefit analysis of backing up)
Operation
Virtualization
Backup frequency
Brute Force Attack
8. These attacks may allow an attacker to construct LDAP statements based on user input statements.
LDAP injection
Web security gateway
Flaming
computer footprint
9. A variety of threats such as viruses - worms - and Trojan horses
MPack
Distributed storage
Malicious code
Character
10. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Identification
ACL (Access Control List)
Role
Digital Certificate
11. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Replay Attack
Trusted OS
ACL (Access Control List)
Sniffer
12. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Reverse proxy
Character
Biometrics
13. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Digital Certificate
VPN
DNS
Information security
14. Four interrelated aspects to _________:Access - data - infrastructure - computers
Separation of duties
DNS Log
Physical security
Encryption
15. Allows a single access point to service different types of users.
Cyberbullying
GIF Layering
Wireless VLANs
Cybercriminals
16. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Association request
Stateless Firewall
War Driving
LEAP
17. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Subject
Load balancing
Cyberstalking/Harassment
Chain
18. Could become a key element in authentication in the future.
Physical security
Whaling
Distributed storage
Cognitive biometrics
19. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Geometric variance
Extreme temperatures
Identity management
Cyberstalking/Harassment
20. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Biometrics
Physical security access control measures
Electronic eavesdropping
Roller barrier
21. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Password Crackers
Role
Internal Threat
DLP
22. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Spyware
Password
CHAP (Challenge Handshake Authentication Protocol)
Cyberbullying
23. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Spoofing
Bluejacking
Tailgate sensors
Fake Antivirus
24. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Whaling
Authorization
Client_Hello
Chain
25. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Three-Way Handshake
Password Crackers
DNS
26. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
Password
CardSpace
Physical security access control measures
27. When organizations use software that filters content to prevent the transmission of unauthorized information
Dumpster Diving
Identity Theft
Content filtering
Replay Attack
28. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Client_Hello
Chain
Stateful Firewall
29. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Social engineering
Whaling
Challenge
Insiders
30. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
Brute Force
Spimming
Malicious Insiders
31. Scrambles information into an alternative form that requires a key or password to decrypt the information
Distributed storage
Authorization
Social engineering
Encryption
32. Floods a Web site with so many requests for service that it slows down or crashes the site
Electronic eavesdropping
Phishing
Denial of service attack
Separation of duties
33. A user accessing a computer system must present credentials or ____ when logging on to the system.
Environmental Threat
Federated identity management
Identification
EAP
34. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Authorization
Orphaned
Black Hat
Sniffer
35. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Server-Side
Boot
Flaming
Floor Guard
36. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Client_Hello
Separation of duties
UDP Flood
Scatternet
37. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Offline cracking
Stateful Firewall
External Threat
Virus
38. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Dwell Time
Blacklisting Software
Backup scope
Testing
39. It is able to code and decode data
Account expiration
ACL
Symmetric encryption
Tailgate sensors
40. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Firewalls
Media for backups
Stateful packet filtering
Hardware Attack
41. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
GIF Layering
UDP Flood
Hash encoding
Logic Bomb
42. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Black Hat
Spyware
Roller barrier
Cyber Theft
43. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP Poisoning
Physical security access control measures
Stateful Firewall
Bluejacking
44. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Orphaned
MPack
Bluesnarfing
Shoulder Surfing
45. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Dwell Time
Firewall logs
War Driving
Distributed
46. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Separation of duties
Spoofing
Malicious Insiders
DAP
47. Using a single authentication credential that is shared across multiple networks.
Authentication request
Identity management
WEP (Wired Equivalent Privacy)
Rootkit
48. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Role Based Access Control
TCP/IP
Amart card
Firewalls
49. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Hoaxes
Amart card
Word Splitting
Worm
50. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
Cyberterrorist
Kerberos
Private