SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pretending to be another person.
Virus
Impersonation
Zone transfer
Dumpster Diving
2. Allows a single access point to service different types of users.
Eavesdropping Attack
Hacker
Firewalls
Wireless VLANs
3. A ____ is a network set up with intentional vulnerabilities.
Account expiration
Role Based Access Control
Offline cracking
Honeynet
4. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Packet tampering
Evil Twin
Identification
Prevention and detection
5. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Malicious Insiders
DNS Hijacking
DMS (Demilitarized Zone)
History
6. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Access Control
Tailgating
Environmental Threat
Cyberbullying
7. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Backup frequency
Web security gateway
Load balancing
Hybird
8. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Tailgate sensors
Wireless VLANs
Separation of duties
Dumpster Diving
9. Floods a Web site with so many requests for service that it slows down or crashes the site
Denial of service attack
Eavesdropping Attack
Two factor security
Scatternet
10. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Hoaxes
NAT
Standard biometrics
Chain
11. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Trojan-horse virus
Standard biometrics
Dumpster Diving
Shoulder Surfing
12. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Identity Theft
Natural Threat
Loop Protection
13. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Proximity reader
Macro
Mouse Trapping
Man-made Threat
14. Related to the perception - thought process - and understanding of the user.
Internal Threat
What is asymmetic encryption?
Human memory
Cognitive biometrics
15. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Media for backups
Loop Protection
Ciphertext
Man-made Threat
16. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Server-Side
Token
Insiders
Smurf Attack
17. Indicates when an account is no longer active.
Stateful Firewall
Account expiration
Wireless VLANs
Client_Hello
18. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Federated identity management
Spear Phishing
Association request
Firewalls
19. How secure the data in your backups is-can use physical security or encryption
Evil Twin
Sniffer
DAP
Security
20. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Dwell Time
computer footprint
Distributed storage
Private
21. Below 70 degrees or above 75 degrees
Extreme temperatures
Locking Cabinets
Loop Protection
Cyberbullying
22. A firewall capable of monitoring a data stream from end to end.
Backup scope
Electronic eavesdropping
Stateful Firewall
Identification
23. People very knowledgeable about computers who use their knowledge to invade other people's computers
Tailgate sensors
ARP Poisoning
Hacker
Stateful Firewall
24. ____ is an image spam that is divided into multiple images.
Kerberos
Resident
GIF Layering
Backup scope
25. An attacker motivated by the ideology to attack computer or infrastructure networks.
Rainbow Tables
Password
Port Scanner
Cyberterrorist
26. When DNS servers exchange information among themselves it is known as a ____.
Rainbow Tables
Sniffer
Floor Guard
Zone transfer
27. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Protocol analyzer
Bluesnarfing
Content-Filtering Firewall
Cyberstalking/Harassment
28. A method for confirming users' identities
Bluejacking
Wireless security
Rogue
Authentication
29. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Two factor security
Insiders
Resident
Encryption
30. Requires mutual authentication used for WLAN encryption using Cisco client software.
Identity management
Orphaned
LEAP
Mouse Trapping
31. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Spoofing
Cyberbullying
Separation of duties
Cipher locks
32. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
External Threat
Content inspection
Hash encoding
Geometric variance
33. A technology that can help to evenly distribute work across a network.
Cybercriminals
Man-in-the-Middle Attack
DLP
Load balancing
34. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Adware
Character
Shoulder Surfing
Distributed storage
35. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Digital Certificate
Floor Guard
Honeypot
White Hat
36. Password and BioMetric
Backup scope
Two factor security
Character
Firewall logs
37. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Man-made Threat
Brute Force Attack
CHAP (Challenge Handshake Authentication Protocol)
Role Based Access Control
38. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
SYN Flood
Swiss Cheese
Firewalls
Backup scope
39. Could become a key element in authentication in the future.
Cognitive biometrics
Resident
DNS
Rule Based Access Control
40. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Hardware Attack
Stateful packet filtering
TACACS
Content filtering
41. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Eavesdropping Attack
Identity Theft
computer footprint
Private
42. A firewall that can block designated types of traffic from entering a protected network.
History
Sniffer
Content-Filtering Firewall
Cyberbullying
43. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
DLP
Digital Certificate
Encryption
Phishing
44. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Internal Threat
Digital Certificate
Hardware Attack
Replay
45. Can also capture transmissions that contain passwords.
Stateful Firewall
SYN Flood
Dumpster Diving
Protocol analyzer
46. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Floor Guard
Phishing
DAP
Session hijacking
47. A framework for transporting authentication protocols instead of the authentication protocol itself.
ACL
Kerberos
EAP
Extreme Humidity
48. Fingerprints and patterns
EAP
MPack
Challenge
BioMetric devices
49. Wants to cause as much damage as possible - without a particular target or goal.
Token
Roller barrier
Electronic Vandal
EAP
50. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Role Based Access Control
Cognitive biometrics
Authentication
CardSpace
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests