SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Virus
Root
VPN
White Hat
2. Web application attacks are considered ____ attacks.
CHAP (Challenge Handshake Authentication Protocol)
Server-Side
Flashing
NAT
3. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
computer footprint
Spimming
Authentication request
Locking Cabinets
4. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Tailgate sensors
Swiss Cheese
MPack
Proximity reader
5. Provides a greater degree of security by implementing port-based authentication.
BioMetric devices
Replay Attack
IEEE 802.1x
Separation of duties
6. Allows a single access point to service different types of users.
Cloud computing
Spoofing
NAT
Wireless VLANs
7. An AP that is set up by an attacker.
Stateful Firewall
Evil Twin
Vishing
Identity Theft
8. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
PAT
Distributed Denial of Service (DDoS)
Orphaned
Electronic Activist (hacktivist)
9. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Sniffer
Brute Force
Evil Twin
External Threat
10. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Password
DMS (Demilitarized Zone)
Bluejacking
UDP Flood
11. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Stateful packet filtering
Dumpster Diving
MPack
Eavesdropping Attack
12. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Subject
Roller barrier
Evil Twin
Rogue
13. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Role Based Access Control
Encryption
Boot
14. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Authentication request
Black Hat
CHAP (Challenge Handshake Authentication Protocol)
Roller barrier
15. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
NAT
Replicating
Whaling
Amart card
16. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Virus
Script Kiddie
CCTV
Authorization
17. Holds the promise of reducing the number of usernames and passwords that users must memorize.
SSO
Trusted OS
Flashing
Packet filtering
18. An attacker motivated by the ideology to attack computer or infrastructure networks.
Content filtering
Cyberterrorist
Bluesnarfing
Cyber Theft
19. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
RADIUS
MPack
computer footprint
Authorization
20. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Identification
War Driving
Bluejacking
Hardware Attack
21. The action that is taken by the subject over the object is called a ____.
Operation
Extreme Humidity
Session hijacking
Mouse Trapping
22. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Worm
Cracker
Port Scanner
Two factor security
23. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Malicious Insiders
Spimming
Authentication request
DNS
24. Related to the perception - thought process - and understanding of the user.
LEAP
Physical security
Loop Protection
Cognitive biometrics
25. Securing a restricted area by erecting a barrier is called ____.
Flaming
Fencing
Rainbow Tables
Prevention and detection
26. The time it takes for a key to be pressed and then released.
Dwell Time
Identity Theft
Token
Backup frequency
27. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Cyberbullying
Orphaned
Port Scanner
Distributed Denial of Service (DDoS)
28. Scrambles information into an alternative form that requires a key or password to decrypt the information
Encryption
Extreme Humidity
GIF Layering
Security
29. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Malicious Insiders
Swiss Cheese
Cipher locks
Spyware
30. A secret combination of letters - numbers - and/or characters that only the user should know.
Authorization
ACL
Password
Electronic Activist (hacktivist)
31. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Spear Phishing
Electronic eavesdropping
Trojan-horse virus
Kerberos
32. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Wireless security
DNS poisoning
70
MPack
33. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Authentication request
Hardware Attack
Three-Way Handshake
Bluesnarfing
34. Floods a Web site with so many requests for service that it slows down or crashes the site
Zone transfer
Denial of service attack
Social engineering
Identity management
35. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
TACACS
Adware
Brute Force
Macro
36. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Tailgate sensors
Cyberbullying
Password
Digital Certificate
37. The most restrictive access control model is ____.
Physical security access control measures
Mandatory Access Control
Authentication
Swiss Cheese
38. Computer crimes involving the theft of money
Identification
Cyber Theft
Proximity reader
Mantrap
39. A technology that can help to evenly distribute work across a network.
Load balancing
Resident
Natural Threat
Man-made Threat
40. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Word Splitting
Testing
Wireless security
Wireless VLANs
41. Sifting through a company's garbage to find information to help break into their computers
Mandatory Access Control
Man-made Threat
Digital Certificate
Dumpster Diving
42. A user under Role Based Access Control can be assigned only one ____.
Authentication request
Role
Authentication
Smurf Attack
43. The process of giving someone permission to do or have something
GIF Layering
Spimming
Dwell Time
Authorization
44. A user accessing a computer system must present credentials or ____ when logging on to the system.
War Driving
Identification
Distributed
Worm
45. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Bluesnarfing
Cyberstalking/Harassment
Replay
Security
46. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Buffer Overflow
DAC
Tailgate sensors
Spimming
47. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Mouse Trapping
LDAP injection
DNS Hijacking
Virtualization
48. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Rainbow Tables
Cyberbullying
Chain
Separation of duties
49. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
War Driving
Replay Attack
Client_Hello
Tailgate sensors
50. Forwards packets across computer networks.
Identity Theft
Router
Electronic Activist (hacktivist)
Internal Threat