SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Drive-by Download
What is asymmetic encryption?
Impersonation
Extreme Humidity
2. Small electronic devices that change user passwords automatically
Brute Force Attack
Token
Content filtering
Packet tampering
3. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
70
Web security gateway
Password
Black Hat
4. An attacker slips through a secure area following a legitimate employee.
Authentication request
Human memory
Virtualization
Tailgating
5. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Loop Protection
Swiss Cheese
Virus
Reverse proxy
6. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Rule Based Access Control
Brute Force Attack
Packet tampering
Cyberterrorist
7. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Brute Force
Honeypot
Tailgating
DNS Hijacking
8. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Insiders
Brute Force
Password Crackers
Logic Bomb
9. A ____ attack is similar to a passive man-in-the-middle attack.
Cognitive biometrics
Replay
Honeypot
Password
10. The action that is taken by the subject over the object is called a ____.
WEP (Wired Equivalent Privacy)
Bluesnarfing
Script Kiddie
Operation
11. The process of giving someone permission to do or have something
Trojan-horse virus
Cybercriminals
Biometrics
Authorization
12. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Script Kiddie
Amart card
CHAP (Challenge Handshake Authentication Protocol)
13. Can be used to determine whether new IP addresses are attempting to probe the network.
Rainbow Tables
Firewall logs
Orphaned
SYN Flood
14. An AP that is set up by an attacker.
Evil Twin
RADIUS
Bluesnarfing
Stateful packet filtering
15. The time it takes for a key to be pressed and then released.
Locking Cabinets
Access Control
Dwell Time
Cipher locks
16. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Roller barrier
ACL (Access Control List)
Cyberstalking/Harassment
17. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Hybird
SYN Flood
Speech recognition
OAuth
18. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Social engineering
Electronic Activist (hacktivist)
Cyberstalking/Harassment
Spyware
19. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Hardware Attack
Access Control
Shoulder Surfing
What is asymmetic encryption?
20. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
DAP
Loop Protection
Distributed
ACL (Access Control List)
21. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Separation of duties
White box
Backup frequency
Rainbow Tables
22. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Wireless security
Bluejacking
Standard biometrics
Natural Threat
23. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Biometrics
NAT
Zone transfer
Dwell Time
24. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Locking Cabinets
Private
Social engineering
Authentication
25. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Electronic Activist (hacktivist)
Content filtering
Whaling
Web security gateway
26. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Floor Guard
Distributed
Account expiration
computer footprint
27. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
UDP Flood
Distributed Denial of Service (DDoS)
Proximity reader
Data
28. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Three-Way Handshake
Testing
Environmental Threat
Swiss Cheese
29. Requires mutual authentication used for WLAN encryption using Cisco client software.
Insiders
Standard biometrics
LEAP
Brute Force
30. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Separation of duties
Flaming
Resident
Replicating
31. An attacker motivated by the ideology to attack computer or infrastructure networks.
WEP (Wired Equivalent Privacy)
Digital Certificate
Cyberterrorist
Stateful packet filtering
32. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Password Crackers
Challenge
Subject
Floor Guard
33. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Character
Whaling
Symmetric encryption
DNS poisoning
34. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Identity management
OAuth
Roller barrier
DAC
35. Ensures that messages are not corrupt or tampered with
DNS Log
Logic Bomb
Operation
Hash encoding
36. A variety of threats such as viruses - worms - and Trojan horses
EAP
Buffer Overflow
Malicious code
Geometric variance
37. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Man-made Threat
Cyberterrorist
Backup scope
Association request
38. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Logic Bomb
Spyware
Dwell Time
Honeypot
39. How secure the data in your backups is-can use physical security or encryption
Security
Word Splitting
Extreme temperatures
Account expiration
40. The ____ model is the least restrictive.
Open Port
DAC
PAT
Worm
41. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
ACL (Access Control List)
Federated identity management
OAuth
Packet filtering
42. Set of rules that allow or deny traffic
Boot
Packet filtering
Honeypot
Cyberterrorist
43. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Media for backups
ARP Poisoning
RADIUS
DMS (Demilitarized Zone)
44. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Flashing
War Driving
Fencing
Hash encoding
45. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Cyberstalking/Harassment
White Hat
Cyberbullying
Symmetric encryption
46. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
DNS poisoning
Script Kiddie
Distributed Denial of Service (DDoS)
Proximity reader
47. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Password
Chain
Biometrics
Trusted OS
48. A method for confirming users' identities
Authentication
External Threat
Packet filtering
Mantrap
49. A threat that originates from outside the company. (ex. power failure.)
Social engineering
External Threat
Man-in-the-Middle Attack
ARP Poisoning
50. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Floor Guard
Rootkit
Locking Cabinets
Hoaxes