SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
MPack
ICMP Flood
Logic Bomb
computer footprint
2. A technology that can help to evenly distribute work across a network.
Content filtering
Fake Antivirus
Load balancing
NAT
3. Can also capture transmissions that contain passwords.
IEEE 802.1x
Protocol analyzer
Role Based Access Control
Extreme Humidity
4. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Flashing
Floor Guard
Role Based Access Control
SSO
5. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Phishing
CCTV
SSO
Swiss Cheese
6. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Router
DAP
DLP
Bluejacking
7. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
CCTV
Replay
Hoaxes
70
8. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
WEP (Wired Equivalent Privacy)
70
Flashing
Natural Threat
9. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Black Hat
Cipher locks
Root
LEAP
10. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Orphaned
Router
Electronic eavesdropping
PAT
11. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Internal Threat
ARP Poisoning
Resident
DNS Log
12. A pay-per-use computing model in which customers pay only for the computing resources they need.
Packet tampering
Cloud computing
Trojan-horse virus
Trusted OS
13. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
DNS Hijacking
Cyber Theft
Environmental Threat
Script Kiddie
14. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
DNS Hijacking
Amart card
EAP
Stateful packet filtering
15. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Brute Force
Phishing
ACL (Access Control List)
Firewall logs
16. Allows a single access point to service different types of users.
Hoaxes
Flaming
Separation of duties
Wireless VLANs
17. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Hardware Attack
ARP Poisoning
Malicious code
MPack
18. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Brute Force Attack
Script Kiddie
Macro
Cracker
19. Sending high volumes of ICMP (usually ping) packets to a target.
Cyber Theft
ICMP Flood
Information security
Extreme temperatures
20. Requires mutual authentication used for WLAN encryption using Cisco client software.
Security
Human memory
Role
LEAP
21. It accepts spoken words for input as if they had been typed on the keyboard.
Association request
Physical security access control measures
Speech recognition
Fake Antivirus
22. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
DNS poisoning
IEEE 802.1x
Cracker
Spimming
23. Can create entries in a log for all queries that are received.
DNS Hijacking
Extreme Humidity
WEP (Wired Equivalent Privacy)
DNS Log
24. Below 70 degrees or above 75 degrees
ICMP Flood
Password
Extreme temperatures
Rule Based Access Control
25. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Worm
Open Port
Proximity reader
War Driving
26. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Scatternet
Spear Phishing
DAP
Cyberbullying
27. Software that can guess passwords
computer footprint
Digital Certificate
Password Crackers
Client_Hello
28. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
What is asymmetic encryption?
Spyware
Man-made Threat
Stateless Firewall
29. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Scatternet
Ciphertext
Distributed Denial of Service (DDoS)
DMS (Demilitarized Zone)
30. A ____ attack is similar to a passive man-in-the-middle attack.
Replay
Amart card
Authentication request
Proximity reader
31. Floods a Web site with so many requests for service that it slows down or crashes the site
Three-Way Handshake
Cracker
Router
Denial of service attack
32. A ____ means that the application or service assigned to that port is listening for any instructions.
Identity Theft
Physical security access control measures
Man-in-the-Middle Attack
Open Port
33. Using a single authentication credential that is shared across multiple networks.
Identity management
Cybercriminals
Floor Guard
Digital Certificate
34. A secret combination of letters - numbers - and/or characters that only the user should know.
Data
What is asymmetic encryption?
Flaming
Password
35. Scrambles information into an alternative form that requires a key or password to decrypt the information
Encryption
TACACS
Content-Filtering Firewall
Proximity reader
36. Often used for managing user access to one or more systems.
Access Control
Electronic Vandal
Rule Based Access Control
CardSpace
37. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Hoaxes
Digital Certificate
DMS (Demilitarized Zone)
Cyberbullying
38. A ____ virus infects the Master Boot Record of a hard disk drive.
Boot
Chain
Social engineering
Malicious Insiders
39. Indicates when an account is no longer active.
Account expiration
Virus
Stateful packet filtering
Subject
40. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Script Kiddie
Data
History
LEAP
41. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Reverse proxy
Fake Antivirus
Smurf Attack
SSO
42. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
LEAP
Open Port
Content inspection
43. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
RADIUS
Denial of service attack
Extreme temperatures
Electronic Vandal
44. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
War Driving
Fake Antivirus
Identity Theft
Smurf Attack
45. Wants to cause as much damage as possible - without a particular target or goal.
Fake Antivirus
Electronic Vandal
Information security
CHAP (Challenge Handshake Authentication Protocol)
46. Below 40% or above 50%
Token
Extreme Humidity
Fencing
Tailgating
47. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Spyware
Distributed
Natural Threat
DAP
48. The process of verifying that your backups actually work
White Hat
Testing
Open Port
Bluesnarfing
49. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Macro
ACL (Access Control List)
Identification
WEP (Wired Equivalent Privacy)
50. The most restrictive access control model is ____.
Cracker
Information security
VPN
Mandatory Access Control
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests