SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
NAT
Vishing
Cyberstalking/Harassment
WEP (Wired Equivalent Privacy)
2. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Man-in-the-Middle Attack
Orphaned
DNS
Roller barrier
3. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Malicious Insiders
Spimming
Internal Threat
Challenge
4. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Swiss Cheese
RADIUS
Environmental Threat
Mouse Trapping
5. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Firewall logs
DNS Hijacking
Firewalls
Virtualization
6. Hides inside other software - usually as an attachment or a downloadable file
DNS
Distributed Denial of Service (DDoS)
Amart card
Trojan-horse virus
7. Due to the limitations of online guessing - most password attacks today use ____.
Offline cracking
Clickjacking
Prevention and detection
Cipher locks
8. A secret combination of letters - numbers - and/or characters that only the user should know.
ACL (Access Control List)
Password
Backup frequency
White box
9. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Social engineering
Standard biometrics
Cyberstalking/Harassment
10. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Mouse Trapping
Open Port
Social engineering
Distributed storage
11. The ____ model is the least restrictive.
DAC
Black Hat
Distributed storage
Insiders
12. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
Zone transfer
Extreme temperatures
Password
13. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Packet tampering
Client_Hello
IEEE 802.1x
Swiss Cheese
14. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Backup frequency
Root
Packet filtering
DLP
15. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
CHAP (Challenge Handshake Authentication Protocol)
Bluesnarfing
Information security
Dumpster Diving
16. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Distributed Denial of Service (DDoS)
ACL (Access Control List)
Worm
Client_Hello
17. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Adware
Role
Mouse Trapping
18. A ____ attack is similar to a passive man-in-the-middle attack.
Trusted OS
Cognitive biometrics
Data
Replay
19. An attacker slips through a secure area following a legitimate employee.
Tailgating
Phishing
Open Port
Cyber Theft
20. Password and BioMetric
Brute Force
Cracker
Tailgating
Two factor security
21. A method for confirming users' identities
PAT
Amart card
Authentication
Evil Twin
22. When organizations use software that filters content to prevent the transmission of unauthorized information
Replicating
Stateful Firewall
LEAP
Content filtering
23. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Electronic eavesdropping
White Hat
Digital Certificate
Cipher locks
24. A framework for transporting authentication protocols instead of the authentication protocol itself.
Spear Phishing
EAP
Eavesdropping Attack
Impersonation
25. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Router
Sniffer
Rogue
VPN
26. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Operation
Fencing
Virus
Rogue
27. A private key and public key
What is asymmetic encryption?
Federated identity management
Identity management
Rainbow Tables
28. These accounts are user accounts that remain active after an employee has left an organization.
CHAP (Challenge Handshake Authentication Protocol)
Proximity reader
Orphaned
Adware
29. A variety of threats such as viruses - worms - and Trojan horses
Testing
Malicious code
Extreme temperatures
Logic Bomb
30. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
DAC
Resident
Swiss Cheese
Web security gateway
31. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Separation of duties
Offline cracking
Brute Force Attack
Amart card
32. A set of permissions that are attached to an object.
Backup frequency
Cognitive biometrics
ACL
SSO
33. Users who access a Web server are usually restricted to the ____ directory.
BioMetric devices
Natural Threat
Environmental Threat
Root
34. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Tailgating
Cracker
Floor Guard
Bluejacking
35. Fingerprints and patterns
WEP (Wired Equivalent Privacy)
computer footprint
BioMetric devices
Dumpster Diving
36. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
DAC
LEAP
Role Based Access Control
PAT
37. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Hash encoding
Cipher locks
Trojan-horse virus
38. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Electronic Vandal
Authentication
Cipher locks
Operation
39. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Testing
Encryption
ARP Poisoning
Brute Force Attack
40. When DNS servers exchange information among themselves it is known as a ____.
Roller barrier
TACACS
Electronic Vandal
Zone transfer
41. Wants to cause as much damage as possible - without a particular target or goal.
Extreme Humidity
DNS Hijacking
Electronic Vandal
BioMetric devices
42. Content filtering - encryption - firewalls
Eavesdropping Attack
Prevention and detection
Cyberstalking/Harassment
DMS (Demilitarized Zone)
43. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Symmetric encryption
Data
Wireless security
Resident
44. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Cipher locks
Association request
White box
Protocol analyzer
45. An attacker motivated by the ideology to attack computer or infrastructure networks.
Cyberterrorist
Hash encoding
Content filtering
Clickjacking
46. An AP that is set up by an attacker.
Spimming
Cognitive biometrics
Evil Twin
Subject
47. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Malicious code
BioMetric devices
DNS
48. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Stateful Firewall
Drive-by Download
Data
Adware
49. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Password Crackers
Zone transfer
Loop Protection
Session hijacking
50. Requires mutual authentication used for WLAN encryption using Cisco client software.
White box
Amart card
Root
LEAP