SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ____ is designed to separate a nonsecured area from a secured area.
WEP (Wired Equivalent Privacy)
Insiders
Mantrap
Replay
2. Scrambles information into an alternative form that requires a key or password to decrypt the information
DNS
Distributed Denial of Service (DDoS)
Encryption
Shoulder Surfing
3. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Subject
Federated identity management
Open Port
Cognitive biometrics
4. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
LDAP injection
Private
Cracker
ACL
5. Hides inside other software - usually as an attachment or a downloadable file
CardSpace
Virus
LDAP injection
Trojan-horse virus
6. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
DNS Log
TCP/IP
Cyberterrorist
Rootkit
7. ____ can be prewired for electrical power as well as wired network connections.
Identity Theft
Firewalls
Orphaned
Locking Cabinets
8. It is able to code and decode data
Dwell Time
Symmetric encryption
Data
Password Crackers
9. It accepts spoken words for input as if they had been typed on the keyboard.
Reverse proxy
Fencing
Speech recognition
Federated identity management
10. A ____ virus infects the Master Boot Record of a hard disk drive.
Proximity reader
Boot
Subject
Backup frequency
11. Forwards packets across computer networks.
Router
Authentication request
Extreme temperatures
Virtualization
12. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Packet tampering
Virus
Tailgate sensors
Amart card
13. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
Chain
Password
TCP/IP
14. Due to the limitations of online guessing - most password attacks today use ____.
Flaming
Information security
Offline cracking
Insiders
15. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Man-made Threat
White Hat
Separation of duties
Social engineering
16. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Roller barrier
Chain
Media for backups
Man-in-the-Middle Attack
17. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Hoaxes
Hash encoding
DAP
Distributed storage
18. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Dwell Time
Tailgate sensors
Man-made Threat
Digital Certificate
19. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Virtualization
Hoaxes
White box
War Driving
20. The action that is taken by the subject over the object is called a ____.
SYN Flood
UDP Flood
Backup scope
Operation
21. Small electronic devices that change user passwords automatically
Rogue
Cloud computing
Token
Federated identity management
22. A ____ means that the application or service assigned to that port is listening for any instructions.
Protocol analyzer
Environmental Threat
Open Port
Bluejacking
23. A private key and public key
Electronic Vandal
Fake Antivirus
What is asymmetic encryption?
Protocol analyzer
24. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Content filtering
Amart card
Proximity reader
Web security gateway
25. Computer crimes involving the theft of money
Hash encoding
ACL
Rootkit
Cyber Theft
26. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Operation
Script Kiddie
Protocol analyzer
Packet filtering
27. The process of giving someone permission to do or have something
Authorization
Open Port
DNS poisoning
Operation
28. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Challenge
SSO
Kerberos
LEAP
29. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Brute Force
History
70
CCTV
30. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Three-Way Handshake
Content-Filtering Firewall
Packet tampering
Sniffer
31. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Spear Phishing
70
Protocol analyzer
DNS Log
32. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Mouse Trapping
History
Resident
Information security
33. A ____ encrypts all data that is transmitted between the remote device and the network.
Malicious Insiders
External Threat
VPN
Shoulder Surfing
34. Related to the perception - thought process - and understanding of the user.
Electronic Activist (hacktivist)
Locking Cabinets
Cognitive biometrics
Backup scope
35. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
Cyberstalking/Harassment
Hardware Attack
ICMP Flood
36. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Hoaxes
Distributed storage
Scatternet
Floor Guard
37. A secret combination of letters - numbers - and/or characters that only the user should know.
Challenge
Password
Security
Electronic Vandal
38. Often used for managing user access to one or more systems.
History
Authentication request
Rule Based Access Control
Information security
39. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
Port Scanner
Macro
PAT
40. Users who access a Web server are usually restricted to the ____ directory.
Replicating
Kerberos
DMS (Demilitarized Zone)
Root
41. People very knowledgeable about computers who use their knowledge to invade other people's computers
Rainbow Tables
IEEE 802.1x
Cyberbullying
Hacker
42. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Private
Information security
Two factor security
Fake Antivirus
43. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Spyware
Fake Antivirus
Identity Theft
OAuth
44. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Extreme temperatures
Script Kiddie
Virus
Chain
45. A technology that can help to evenly distribute work across a network.
Distributed storage
Cyber Theft
Rootkit
Load balancing
46. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Floor Guard
EAP
Identity Theft
computer footprint
47. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Role Based Access Control
Two factor security
Extreme Humidity
Hybird
48. ____ involves horizontally separating words - although it is still readable by the human eye.
Human memory
Word Splitting
Client_Hello
LDAP injection
49. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Information security
Virtualization
Vishing
Phishing
50. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Server-Side
Session hijacking
SYN Flood
External Threat