SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Private
Eavesdropping Attack
computer footprint
Authentication
2. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
DNS Log
Content-Filtering Firewall
Flashing
Cyber Theft
3. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Rainbow Tables
Private
Backup scope
War Driving
4. Floods a Web site with so many requests for service that it slows down or crashes the site
Cognitive biometrics
CHAP (Challenge Handshake Authentication Protocol)
Cloud computing
Denial of service attack
5. Viruses and worms are said to be self-____.
Session hijacking
External Threat
Prevention and detection
Replicating
6. Lock - conduit - card key - video equipment - secured guard
Electronic Activist (hacktivist)
Backup frequency
Physical security access control measures
Authentication
7. Password and BioMetric
Two factor security
Packet tampering
External Threat
Swiss Cheese
8. A private key and public key
Character
What is asymmetic encryption?
Firewall logs
Bluejacking
9. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Vishing
Kerberos
Loop Protection
Whaling
10. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
WEP (Wired Equivalent Privacy)
Load balancing
Rainbow Tables
CCTV
11. Fingerprints and patterns
Geometric variance
Biometrics
BioMetric devices
Bluejacking
12. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
DMS (Demilitarized Zone)
Spoofing
Separation of duties
Web security gateway
13. Can be used to determine whether new IP addresses are attempting to probe the network.
Adware
Firewall logs
Role
Amart card
14. The time it takes for a key to be pressed and then released.
DNS Hijacking
Dwell Time
Hardware Attack
Reverse proxy
15. Sending high volumes of ICMP (usually ping) packets to a target.
PAT
Zone transfer
Prevention and detection
ICMP Flood
16. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
BioMetric devices
Open Port
Swiss Cheese
Brute Force
17. The action that is taken by the subject over the object is called a ____.
Port Scanner
Hardware Attack
Operation
Insiders
18. Could become a key element in authentication in the future.
White box
Cognitive biometrics
Clickjacking
Distributed
19. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Trojan-horse virus
Extreme Humidity
GIF Layering
MPack
20. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Cyberstalking/Harassment
VPN
SYN Flood
Association request
21. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Spyware
Packet filtering
Sniffer
Cyberbullying
22. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Cyberterrorist
Boot
TCP/IP
Whaling
23. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
GIF Layering
DAP
UDP Flood
Natural Threat
24. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Hacker
External Threat
Challenge
Eavesdropping Attack
25. An attacker slips through a secure area following a legitimate employee.
Federated identity management
Identity management
Stateful Firewall
Tailgating
26. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
70
Mouse Trapping
Association request
Malicious Insiders
27. Requires mutual authentication used for WLAN encryption using Cisco client software.
What is asymmetic encryption?
Mouse Trapping
LEAP
Extreme temperatures
28. A threat that originates from outside the company. (ex. power failure.)
Distributed
Router
External Threat
Eavesdropping Attack
29. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Black Hat
War Driving
Identification
ACL
30. A ____ virus infects the Master Boot Record of a hard disk drive.
Boot
Hacker
Three-Way Handshake
Stateless Firewall
31. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Resident
Electronic Activist (hacktivist)
Rogue
Three-Way Handshake
32. ____ is an image spam that is divided into multiple images.
Backup frequency
Identity Theft
DAP
GIF Layering
33. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Replay Attack
Standard biometrics
Federated identity management
External Threat
34. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cyberbullying
Boot
SYN Flood
Cloud computing
35. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Sniffer
Distributed Denial of Service (DDoS)
Electronic eavesdropping
Internal Threat
36. Sifting through a company's garbage to find information to help break into their computers
Dumpster Diving
Flaming
IEEE 802.1x
Natural Threat
37. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Flaming
Cracker
Packet filtering
Token
38. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Floor Guard
Denial of service attack
Hybird
Evil Twin
39. A technology that can help to evenly distribute work across a network.
GIF Layering
Electronic eavesdropping
Load balancing
Stateful Firewall
40. Hides inside other software - usually as an attachment or a downloadable file
Black Hat
Roller barrier
Spimming
Trojan-horse virus
41. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Data
Clickjacking
Identity Theft
Black Hat
42. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Information security
TACACS
Rogue
43. A security analysis of the transaction within its approved context.
Content inspection
Data
NAT
DMS (Demilitarized Zone)
44. The process of verifying that your backups actually work
BioMetric devices
Testing
Kerberos
Authentication
45. Set of rules that allow or deny traffic
Role
Loop Protection
Packet filtering
Chain
46. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Media for backups
Identity Theft
Cyberterrorist
Distributed storage
47. When organizations use software that filters content to prevent the transmission of unauthorized information
Man-made Threat
Content filtering
WEP (Wired Equivalent Privacy)
Resident
48. Broadcast storms can be prevented with ____.
Loop Protection
EAP
Root
Offline cracking
49. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Packet tampering
Client_Hello
Character
Extreme Humidity
50. Software that can guess passwords
Amart card
Natural Threat
Password Crackers
External Threat