SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Script Kiddie
Flaming
Blacklisting Software
CCTV
2. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Malicious code
Private
Content-Filtering Firewall
Brute Force Attack
3. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Impersonation
Federated identity management
Chain
Boot
4. Using a single authentication credential that is shared across multiple networks.
Identity management
Content-Filtering Firewall
SSO
Rule Based Access Control
5. A pay-per-use computing model in which customers pay only for the computing resources they need.
History
Access Control
Spyware
Cloud computing
6. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Biometrics
Man-in-the-Middle Attack
Cipher locks
Denial of service attack
7. A ____ is a network set up with intentional vulnerabilities.
Fake Antivirus
Honeynet
Speech recognition
Swiss Cheese
8. Holds the promise of reducing the number of usernames and passwords that users must memorize.
NAT
Root
SSO
Environmental Threat
9. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
Electronic Activist (hacktivist)
Bluejacking
Stateful Firewall
10. ____ can be prewired for electrical power as well as wired network connections.
Malicious Insiders
DMS (Demilitarized Zone)
Locking Cabinets
Social engineering
11. A ____ is designed to separate a nonsecured area from a secured area.
Protocol analyzer
Mantrap
Cybercriminals
Standard biometrics
12. A method for confirming users' identities
Spimming
Authentication
Server-Side
Packet tampering
13. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Association request
Flashing
Subject
Resident
14. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
Locking Cabinets
Trusted OS
Extreme Humidity
15. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Client_Hello
Stateful packet filtering
Social engineering
Phishing
16. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Zone transfer
Scatternet
Three-Way Handshake
17. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Content-Filtering Firewall
Cybercriminals
Firewalls
War Driving
18. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Cloud computing
What is asymmetic encryption?
Encryption
Floor Guard
19. A variety of threats such as viruses - worms - and Trojan horses
ICMP Flood
Malicious code
Script Kiddie
Three-Way Handshake
20. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Adware
Sniffer
DNS poisoning
Bluesnarfing
21. Ensures that messages are not corrupt or tampered with
Biometrics
Testing
Hash encoding
DNS
22. An authentication process that involves three steps.
Two factor security
Standard biometrics
Three-Way Handshake
Security
23. The action that is taken by the subject over the object is called a ____.
Operation
Hacker
NAT
Rootkit
24. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Security
LDAP injection
Access Control
Environmental Threat
25. Sending high volumes of UDP requests to a target.
Dumpster Diving
UDP Flood
NAT
Load balancing
26. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Testing
Drive-by Download
Locking Cabinets
Man-made Threat
27. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Logic Bomb
White box
Distributed Denial of Service (DDoS)
computer footprint
28. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
Content-Filtering Firewall
Ciphertext
Eavesdropping Attack
29. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Access Control
Packet tampering
Data
Identification
30. Computer crimes involving the theft of money
Adware
Fencing
Distributed storage
Cyber Theft
31. A private key and public key
Social engineering
Honeypot
What is asymmetic encryption?
Buffer Overflow
32. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Dumpster Diving
Malicious Insiders
ACL
Evil Twin
33. An attacker motivated by the ideology to attack computer or infrastructure networks.
CardSpace
Rule Based Access Control
Cyberterrorist
Identification
34. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Cyberbullying
Scatternet
VPN
35. A firewall capable of monitoring a data stream from end to end.
Malicious Insiders
Stateful Firewall
Content filtering
Brute Force
36. The weakness of passwords centers on ____.
Federated identity management
Human memory
Offline cracking
Internal Threat
37. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
White box
Security
DAP
Human memory
38. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Proximity reader
Human memory
Mantrap
39. A technology that can help to evenly distribute work across a network.
Hacker
Cracker
Load balancing
Tailgate sensors
40. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Cyber Theft
Cognitive biometrics
DMS (Demilitarized Zone)
Electronic eavesdropping
41. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Bluejacking
SSO
Resident
Data
42. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Clickjacking
Session hijacking
Distributed storage
Impersonation
43. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Separation of duties
White Hat
Virtualization
Mandatory Access Control
44. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
MPack
Virus
Spoofing
Media for backups
45. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Honeypot
Kerberos
Cyberstalking/Harassment
Man-made Threat
46. People very knowledgeable about computers who use their knowledge to invade other people's computers
Hacker
Flaming
Extreme temperatures
Spear Phishing
47. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Malicious Insiders
Password
Role Based Access Control
CardSpace
48. Web application attacks are considered ____ attacks.
TCP/IP
Server-Side
Spoofing
What is asymmetic encryption?
49. Often used for managing user access to one or more systems.
Distributed Denial of Service (DDoS)
Encryption
Rule Based Access Control
EAP
50. ____ is an image spam that is divided into multiple images.
Cybercriminals
GIF Layering
Physical security
Firewalls