SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Packet filtering
Backup scope
Packet tampering
Subject
2. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Scatternet
Cybercriminals
Extreme Humidity
Cyber Theft
3. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Honeynet
TACACS
computer footprint
Proximity reader
4. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Distributed storage
Resident
Firewall logs
Sniffer
5. Floods a Web site with so many requests for service that it slows down or crashes the site
Scatternet
Impersonation
Encryption
Denial of service attack
6. Web application attacks are considered ____ attacks.
Kerberos
Server-Side
Ciphertext
Natural Threat
7. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Media for backups
Spyware
Spimming
ACL (Access Control List)
8. Often used for managing user access to one or more systems.
Rule Based Access Control
Vishing
Spimming
Environmental Threat
9. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Smurf Attack
External Threat
Honeypot
Macro
10. The time it takes for a key to be pressed and then released.
Electronic Activist (hacktivist)
Wireless security
Subject
Dwell Time
11. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Shoulder Surfing
War Driving
Fencing
Web security gateway
12. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Firewall logs
Virus
DNS poisoning
Macro
13. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DAP
Electronic eavesdropping
Wireless security
Federated identity management
14. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Spear Phishing
Kerberos
Drive-by Download
GIF Layering
15. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Virtualization
Identity Theft
Client_Hello
Spoofing
16. Related to the perception - thought process - and understanding of the user.
Content-Filtering Firewall
Separation of duties
Information security
Cognitive biometrics
17. A ____ means that the application or service assigned to that port is listening for any instructions.
Physical security access control measures
Client_Hello
Open Port
Authentication request
18. People very knowledgeable about computers who use their knowledge to invade other people's computers
Flaming
Internal Threat
Hacker
Root
19. Forwards packets across computer networks.
Router
Biometrics
Bluejacking
Packet tampering
20. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
DNS
VPN
Natural Threat
Trusted OS
21. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
History
Macro
EAP
VPN
22. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Role Based Access Control
Replay Attack
Bluejacking
Bluejacking
23. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Electronic Vandal
Evil Twin
Standard biometrics
Root
24. Fingerprints and patterns
Trusted OS
Encryption
BioMetric devices
Virus
25. ____ involves horizontally separating words - although it is still readable by the human eye.
Word Splitting
Spoofing
Replay Attack
Physical security access control measures
26. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Macro
Firewalls
Spear Phishing
Offline cracking
27. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Scatternet
CardSpace
Floor Guard
Man-in-the-Middle Attack
28. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Flaming
Cognitive biometrics
Wireless security
Dumpster Diving
29. A security analysis of the transaction within its approved context.
Information security
SSO
Content inspection
Distributed Denial of Service (DDoS)
30. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Honeypot
Cognitive biometrics
Natural Threat
Electronic Activist (hacktivist)
31. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Port Scanner
Rootkit
Clickjacking
MPack
32. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
Kerberos
Internal Threat
Eavesdropping Attack
33. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Trusted OS
Evil Twin
Flashing
Federated identity management
34. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
CardSpace
Spyware
DNS Hijacking
Black Hat
35. Could become a key element in authentication in the future.
Password
GIF Layering
Cognitive biometrics
SSO
36. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Information security
Resident
Access Control
Replay Attack
37. An attacker motivated by the ideology to attack computer or infrastructure networks.
Rogue
Cyberterrorist
Impersonation
Floor Guard
38. Allows a single access point to service different types of users.
Wireless VLANs
Kerberos
Spoofing
Identity Theft
39. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Symmetric encryption
Cyberterrorist
Replay
40. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Password Crackers
Phishing
DNS Hijacking
Cognitive biometrics
41. The action that is taken by the subject over the object is called a ____.
Operation
Eavesdropping Attack
NAT
Extreme Humidity
42. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Access Control
Brute Force
Hoaxes
Cyberterrorist
43. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
PAT
Drive-by Download
Rogue
Standard biometrics
44. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Cybercriminals
Firewall logs
Hoaxes
Insiders
45. An attacker slips through a secure area following a legitimate employee.
Tailgating
LEAP
Dwell Time
Black Hat
46. A means of managing and presenting computer resources by function without regard to their physical layout or location.
NAT
Virtualization
Distributed
Electronic eavesdropping
47. ____ attacks are responsible for half of all malware delivered by Web advertising.
Loop Protection
Fake Antivirus
Locking Cabinets
Federated identity management
48. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Spimming
Ciphertext
Kerberos
Eavesdropping Attack
49. Small electronic devices that change user passwords automatically
BioMetric devices
Identification
Token
Dumpster Diving
50. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
Hybird
Man-in-the-Middle Attack
Cybercriminals
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests