SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
NAT
WEP (Wired Equivalent Privacy)
Private
Protocol analyzer
2. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Access Control
Bluejacking
Hacker
Cyberbullying
3. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
computer footprint
Hardware Attack
Spear Phishing
Security
4. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Root
DNS poisoning
Dwell Time
Token
5. An AP that is set up by an attacker.
Prevention and detection
Brute Force
Mandatory Access Control
Evil Twin
6. Often used for managing user access to one or more systems.
Protocol analyzer
Word Splitting
Environmental Threat
Rule Based Access Control
7. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
Identification
LEAP
DNS poisoning
8. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Media for backups
Cyber Theft
Fake Antivirus
Malicious code
9. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Testing
Mandatory Access Control
Smurf Attack
CCTV
10. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Loop Protection
RADIUS
Mandatory Access Control
Natural Threat
11. A commonly used technique by pornography sites where a user gets "locked" in a web site.
computer footprint
Human memory
Boot
Mouse Trapping
12. Wants to cause as much damage as possible - without a particular target or goal.
Electronic eavesdropping
Honeypot
Cipher locks
Electronic Vandal
13. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Evil Twin
MPack
LEAP
Backup scope
14. A ____ is a network set up with intentional vulnerabilities.
Rootkit
Honeynet
Swiss Cheese
CHAP (Challenge Handshake Authentication Protocol)
15. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Man-in-the-Middle Attack
LDAP injection
Wireless security
EAP
16. A user accessing a computer system must present credentials or ____ when logging on to the system.
Virtualization
Identification
DNS poisoning
Word Splitting
17. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
ARP Poisoning
Challenge
Malicious Insiders
Cognitive biometrics
18. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Black Hat
Association request
Replicating
Standard biometrics
19. How many past backups you keep - what you did on your machine etc.
Logic Bomb
History
Private
Electronic Activist (hacktivist)
20. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Environmental Threat
MPack
Denial of service attack
Insiders
21. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Digital Certificate
War Driving
Spimming
Speech recognition
22. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Role Based Access Control
Identity management
Adware
White Hat
23. The action that is taken by the subject over the object is called a ____.
Operation
Cloud computing
Insiders
Eavesdropping Attack
24. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
Digital Certificate
Hardware Attack
Backup frequency
25. Can create entries in a log for all queries that are received.
DAP
CHAP (Challenge Handshake Authentication Protocol)
Character
DNS Log
26. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Eavesdropping Attack
Swiss Cheese
Hoaxes
CHAP (Challenge Handshake Authentication Protocol)
27. Sending high volumes of UDP requests to a target.
UDP Flood
Fake Antivirus
VPN
Open Port
28. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
SYN Flood
CardSpace
External Threat
Electronic Activist (hacktivist)
29. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Distributed Denial of Service (DDoS)
Internal Threat
Eavesdropping Attack
Content filtering
30. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Electronic Activist (hacktivist)
Brute Force
NAT
Physical security
31. Using a single authentication credential that is shared across multiple networks.
Identity management
Floor Guard
VPN
Subject
32. Lock - conduit - card key - video equipment - secured guard
NAT
Physical security access control measures
Vishing
Cybercriminals
33. A threat that originates from outside the company. (ex. power failure.)
External Threat
Malicious Insiders
Phishing
Man-in-the-Middle Attack
34. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Orphaned
Token
Worm
DMS (Demilitarized Zone)
35. To create a rainbow table - each ____ begins with an initial password that is encrypted.
BioMetric devices
Authorization
History
Chain
36. When DNS servers exchange information among themselves it is known as a ____.
Logic Bomb
Cyberbullying
Physical security access control measures
Zone transfer
37. Users who access a Web server are usually restricted to the ____ directory.
Open Port
Root
Brute Force
LEAP
38. Password and BioMetric
Two factor security
Character
Bluejacking
Rule Based Access Control
39. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Rootkit
Ciphertext
Backup frequency
ICMP Flood
40. Fingerprints and patterns
BioMetric devices
EAP
OAuth
Testing
41. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Load balancing
Shoulder Surfing
Malicious code
Hybird
42. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Firewall logs
Character
Access Control
Wireless security
43. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Stateless Firewall
Bluejacking
Buffer Overflow
Vishing
44. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
Electronic Vandal
CardSpace
LEAP
45. A program that is automatically downloaded to your computer without your consent or even your knowledge.
WEP (Wired Equivalent Privacy)
Access Control
Drive-by Download
Locking Cabinets
46. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Fencing
Brute Force Attack
Distributed
Biometrics
47. Requires mutual authentication used for WLAN encryption using Cisco client software.
LEAP
Boot
War Driving
Identity Theft
48. A private key and public key
SYN Flood
Encryption
TCP/IP
What is asymmetic encryption?
49. A technology that can help to evenly distribute work across a network.
Wireless VLANs
Insiders
Load balancing
Biometrics
50. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Brute Force
Bluejacking
IEEE 802.1x
Internal Threat
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests