SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Drive-by Download
Hybird
ICMP Flood
Rainbow Tables
2. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Tailgate sensors
Wireless security
Logic Bomb
Authentication
3. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Access Control
Kerberos
Challenge
ICMP Flood
4. Form of phishing that targets wealthy individuals.
Hardware Attack
Brute Force Attack
Whaling
Role
5. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Amart card
Adware
70
Flaming
6. Forwards packets across computer networks.
Flaming
Open Port
Router
Environmental Threat
7. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Replicating
Backup frequency
Roller barrier
Rootkit
8. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Cyberstalking/Harassment
Spear Phishing
Sniffer
Swiss Cheese
9. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Amart card
Smurf Attack
Malicious Insiders
Reverse proxy
10. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
DNS Hijacking
Physical security
Testing
Cyber Theft
11. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Virtualization
Worm
War Driving
Rootkit
12. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Locking Cabinets
Load balancing
Fake Antivirus
Worm
13. A group of piconets in which connections exist between different piconets is called a ____.
Identity Theft
VPN
Offline cracking
Scatternet
14. People very knowledgeable about computers who use their knowledge to invade other people's computers
Spimming
DAP
Password
Hacker
15. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Stateless Firewall
Content-Filtering Firewall
Impersonation
Standard biometrics
16. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Logic Bomb
Spyware
Authorization
Cloud computing
17. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Man-made Threat
CCTV
Rainbow Tables
Account expiration
18. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Cipher locks
Spimming
Stateless Firewall
MPack
19. A ____ is a network set up with intentional vulnerabilities.
Cipher locks
Stateful Firewall
ACL (Access Control List)
Honeynet
20. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Speech recognition
Two factor security
Honeypot
External Threat
21. A ____ means that the application or service assigned to that port is listening for any instructions.
Stateless Firewall
Physical security
Open Port
Bluejacking
22. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
TCP/IP
Boot
Geometric variance
Stateful packet filtering
23. Due to the limitations of online guessing - most password attacks today use ____.
Offline cracking
Social engineering
Tailgate sensors
Mandatory Access Control
24. A variety of threats such as viruses - worms - and Trojan horses
Bluesnarfing
TCP/IP
Malicious code
DLP
25. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Separation of duties
Distributed Denial of Service (DDoS)
Adware
Extreme Humidity
26. A user accessing a computer system must present credentials or ____ when logging on to the system.
Rule Based Access Control
CHAP (Challenge Handshake Authentication Protocol)
Identification
Password Crackers
27. A form of filtering that blocks only sites specified as harmful.
Cognitive biometrics
Electronic Vandal
Flashing
Blacklisting Software
28. A technique for crashing by sending too much data to the buffer in a comuter's memory
DNS
TCP/IP
Mouse Trapping
Buffer Overflow
29. Broadcast storms can be prevented with ____.
Fake Antivirus
Zone transfer
Loop Protection
Phishing
30. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Malicious Insiders
Mouse Trapping
Drive-by Download
Honeypot
31. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Media for backups
Bluejacking
GIF Layering
DAC
32. Provides a greater degree of security by implementing port-based authentication.
Packet filtering
IEEE 802.1x
Blacklisting Software
EAP
33. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Brute Force
Phishing
Swiss Cheese
Evil Twin
34. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Flashing
Cybercriminals
Stateless Firewall
Spoofing
35. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Mandatory Access Control
Adware
Identity Theft
Logic Bomb
36. ____ involves horizontally separating words - although it is still readable by the human eye.
Sniffer
Word Splitting
Physical security
Replay
37. Holds the promise of reducing the number of usernames and passwords that users must memorize.
SSO
Packet filtering
Rule Based Access Control
Bluesnarfing
38. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Replay Attack
Evil Twin
Environmental Threat
Hoaxes
39. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Tailgating
UDP Flood
Honeynet
CHAP (Challenge Handshake Authentication Protocol)
40. Related to the perception - thought process - and understanding of the user.
Cognitive biometrics
Human memory
Word Splitting
Wireless security
41. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
DLP
RADIUS
LDAP injection
Insiders
42. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Separation of duties
Bluesnarfing
Clickjacking
Spoofing
43. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Three-Way Handshake
What is asymmetic encryption?
Spimming
Kerberos
44. A ____ encrypts all data that is transmitted between the remote device and the network.
Cyber Theft
VPN
RADIUS
Standard biometrics
45. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
Denial of service attack
Backup scope
Two factor security
46. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Authentication request
Authorization
Bluesnarfing
DNS Log
47. ____ can be prewired for electrical power as well as wired network connections.
Mandatory Access Control
History
Locking Cabinets
Whaling
48. Sending high volumes of UDP requests to a target.
70
UDP Flood
Cloud computing
Kerberos
49. The most restrictive access control model is ____.
Swiss Cheese
Mandatory Access Control
Impersonation
External Threat
50. Fingerprints and patterns
Drive-by Download
BioMetric devices
Protocol analyzer
Password