SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When DNS servers exchange information among themselves it is known as a ____.
Web security gateway
Physical security access control measures
Zone transfer
EAP
2. The action that is taken by the subject over the object is called a ____.
Operation
Bluejacking
CardSpace
Rogue
3. Scrambles information into an alternative form that requires a key or password to decrypt the information
Whaling
Stateless Firewall
Encryption
Shoulder Surfing
4. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Content filtering
Vishing
Password
Identification
5. Viruses and worms are said to be self-____.
Replicating
Malicious Insiders
Content filtering
Distributed
6. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Testing
ACL
Trojan-horse virus
Internal Threat
7. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Amart card
White box
SYN Flood
8. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
BioMetric devices
Dwell Time
Bluesnarfing
Identity Theft
9. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Social engineering
Worm
Phishing
Spyware
10. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Separation of duties
Trusted OS
Character
GIF Layering
11. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Cyberstalking/Harassment
Virus
Chain
SSO
12. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Identification
Access Control
Cyberbullying
Virus
13. A technique that allows private IP addresses to be used on the public Internet.
Human memory
Private
NAT
Electronic Activist (hacktivist)
14. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Adware
Drive-by Download
Man-made Threat
Root
15. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Hardware Attack
War Driving
Flaming
Digital Certificate
16. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Wireless security
Spoofing
DMS (Demilitarized Zone)
War Driving
17. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
computer footprint
Roller barrier
Cracker
DNS poisoning
18. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Electronic Activist (hacktivist)
DNS Hijacking
Content-Filtering Firewall
Mouse Trapping
19. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Backup frequency
Trojan-horse virus
Brute Force Attack
Physical security
20. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Electronic eavesdropping
Identity management
PAT
LDAP injection
21. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Operation
Backup scope
Honeypot
Word Splitting
22. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Geometric variance
Symmetric encryption
Flashing
23. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Physical security access control measures
Sniffer
Cyber Theft
Hacker
24. A pay-per-use computing model in which customers pay only for the computing resources they need.
Reverse proxy
Fencing
Cloud computing
DAC
25. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Fake Antivirus
Brute Force Attack
Cyberbullying
Session hijacking
26. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Load balancing
70
External Threat
PAT
27. An attacker motivated by the ideology to attack computer or infrastructure networks.
Cyberterrorist
Ciphertext
Challenge
Speech recognition
28. An attacker slips through a secure area following a legitimate employee.
Tailgating
Vishing
Hacker
Drive-by Download
29. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
VPN
Distributed Denial of Service (DDoS)
Role Based Access Control
Stateless Firewall
30. A ____ is designed to separate a nonsecured area from a secured area.
Identification
Mantrap
Malicious Insiders
Evil Twin
31. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Rainbow Tables
Client_Hello
Open Port
Digital Certificate
32. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Content inspection
Virtualization
Resident
Distributed storage
33. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Cloud computing
Cognitive biometrics
Rootkit
MPack
34. Web application attacks are considered ____ attacks.
Role
Electronic Vandal
Server-Side
Firewall logs
35. How secure the data in your backups is-can use physical security or encryption
Roller barrier
Identity Theft
Security
CardSpace
36. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
TACACS
computer footprint
GIF Layering
Virus
37. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Session hijacking
Rainbow Tables
Content filtering
Eavesdropping Attack
38. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Electronic Activist (hacktivist)
computer footprint
RADIUS
Content-Filtering Firewall
39. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Spear Phishing
Buffer Overflow
Whaling
Bluejacking
40. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Firewalls
Offline cracking
Tailgate sensors
Flashing
41. The protection of information from accidental or intentional misuse by persons inside or outside an organization
CardSpace
Token
Information security
Authentication request
42. Computer crimes involving the theft of money
Role Based Access Control
Information security
Cyber Theft
Hoaxes
43. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Media for backups
Mandatory Access Control
TCP/IP
Electronic eavesdropping
44. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Insiders
Loop Protection
Symmetric encryption
RADIUS
45. A threat that originates from outside the company. (ex. power failure.)
SSO
Honeypot
External Threat
Offline cracking
46. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
VPN
Kerberos
Geometric variance
Cognitive biometrics
47. Often used for managing user access to one or more systems.
Brute Force
Ciphertext
Rule Based Access Control
Rootkit
48. A ____ is a network set up with intentional vulnerabilities.
Honeynet
Cyberstalking/Harassment
Hash encoding
Firewalls
49. Pretending to be another person.
Cyberterrorist
Spyware
Impersonation
CardSpace
50. A technology that can help to evenly distribute work across a network.
Server-Side
Reverse proxy
Load balancing
Cracker