SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ensures that messages are not corrupt or tampered with
Physical security access control measures
Replay Attack
Access Control
Hash encoding
2. The weakness of passwords centers on ____.
Subject
WEP (Wired Equivalent Privacy)
Human memory
ACL
3. Often used for managing user access to one or more systems.
Rule Based Access Control
LEAP
Subject
Whaling
4. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Firewall logs
Virus
Three-Way Handshake
5. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Swiss Cheese
Account expiration
Rootkit
CardSpace
6. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Spimming
OAuth
Encryption
ACL (Access Control List)
7. A security analysis of the transaction within its approved context.
Offline cracking
Content inspection
Prevention and detection
History
8. ____ attacks are responsible for half of all malware delivered by Web advertising.
Hardware Attack
Wireless VLANs
Content filtering
Fake Antivirus
9. An attacker slips through a secure area following a legitimate employee.
Man-in-the-Middle Attack
Tailgating
Private
Eavesdropping Attack
10. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Man-made Threat
Hardware Attack
Phishing
70
11. Related to the perception - thought process - and understanding of the user.
SSO
Vishing
Cognitive biometrics
Distributed Denial of Service (DDoS)
12. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Smurf Attack
Virtualization
computer footprint
Operation
13. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Boot
IEEE 802.1x
Packet tampering
Smurf Attack
14. A ____ attack is similar to a passive man-in-the-middle attack.
DNS Hijacking
Replay
Replay Attack
Load balancing
15. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Server-Side
Spoofing
Rogue
Geometric variance
16. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Black Hat
Spimming
Cyber Theft
Character
17. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Stateful Firewall
MPack
DNS
Black Hat
18. Viruses and worms are said to be self-____.
Replicating
White Hat
Token
TACACS
19. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Bluesnarfing
Cyberstalking/Harassment
Identity Theft
Scatternet
20. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Insiders
Rogue
DNS poisoning
Geometric variance
21. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Hacker
LEAP
Wireless VLANs
22. A variety of threats such as viruses - worms - and Trojan horses
Proximity reader
Malicious code
Web security gateway
Logic Bomb
23. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Locking Cabinets
Testing
Extreme temperatures
Replay Attack
24. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Logic Bomb
Resident
Geometric variance
Identification
25. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
External Threat
Symmetric encryption
CardSpace
Tailgate sensors
26. A pay-per-use computing model in which customers pay only for the computing resources they need.
Virus
Content-Filtering Firewall
DNS
Cloud computing
27. Set of rules that allow or deny traffic
GIF Layering
Packet filtering
Wireless VLANs
Mantrap
28. Provides a greater degree of security by implementing port-based authentication.
IEEE 802.1x
computer footprint
Spoofing
Script Kiddie
29. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Malicious Insiders
Character
Black Hat
Phishing
30. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Association request
Data
Hoaxes
Load balancing
31. A set of permissions that are attached to an object.
ACL
Password Crackers
Bluejacking
Data
32. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Flashing
Cyber Theft
DMS (Demilitarized Zone)
Sniffer
33. Allows a single access point to service different types of users.
Wireless security
Brute Force Attack
Internal Threat
Wireless VLANs
34. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Mantrap
Cracker
Hacker
Backup scope
35. The process of giving someone permission to do or have something
WEP (Wired Equivalent Privacy)
Authorization
Identity Theft
Cracker
36. Software that can guess passwords
Password Crackers
Stateful packet filtering
RADIUS
Port Scanner
37. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Clickjacking
Bluejacking
Packet filtering
Hoaxes
38. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
TCP/IP
computer footprint
War Driving
Web security gateway
39. Password and BioMetric
Two factor security
DNS Hijacking
Cognitive biometrics
Authorization
40. Requires mutual authentication used for WLAN encryption using Cisco client software.
Replay Attack
ICMP Flood
PAT
LEAP
41. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Black Hat
Human memory
Electronic Activist (hacktivist)
Macro
42. How secure the data in your backups is-can use physical security or encryption
Cyberterrorist
CHAP (Challenge Handshake Authentication Protocol)
Security
Extreme Humidity
43. A ____ encrypts all data that is transmitted between the remote device and the network.
LEAP
VPN
TACACS
Operation
44. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
ACL (Access Control List)
Cyberterrorist
NAT
Flaming
45. The time it takes for a key to be pressed and then released.
Dwell Time
Standard biometrics
Extreme Humidity
War Driving
46. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Client_Hello
Roller barrier
ACL (Access Control List)
Smurf Attack
47. Form of phishing that targets wealthy individuals.
PAT
Whaling
Honeynet
Trusted OS
48. An attack that forces a user to unintentionally click a link.
Clickjacking
Session hijacking
VPN
Buffer Overflow
49. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
Worm
External Threat
Honeynet
50. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Smurf Attack
Amart card
Dwell Time
Spoofing