SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The action that is taken by the subject over the object is called a ____.
Swiss Cheese
Electronic Vandal
Server-Side
Operation
2. A ____ encrypts all data that is transmitted between the remote device and the network.
VPN
Bluesnarfing
Insiders
Distributed
3. People very knowledgeable about computers who use their knowledge to invade other people's computers
Hacker
Role Based Access Control
Access Control
Web security gateway
4. The time it takes for a key to be pressed and then released.
LEAP
Proximity reader
Dwell Time
Content inspection
5. A group of piconets in which connections exist between different piconets is called a ____.
Scatternet
Cyber Theft
Cipher locks
Identity management
6. ____ can be prewired for electrical power as well as wired network connections.
Physical security
Replay Attack
Locking Cabinets
computer footprint
7. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Access Control
Security
Character
OAuth
8. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Backup scope
GIF Layering
Identification
Stateful packet filtering
9. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Evil Twin
Spoofing
Load balancing
Dwell Time
10. Wants to cause as much damage as possible - without a particular target or goal.
computer footprint
Cracker
Media for backups
Electronic Vandal
11. The most restrictive access control model is ____.
Replicating
Mandatory Access Control
Brute Force
Internal Threat
12. A ____ virus infects the Master Boot Record of a hard disk drive.
Operation
Authorization
Boot
Distributed storage
13. Four interrelated aspects to _________:Access - data - infrastructure - computers
GIF Layering
Two factor security
Physical security
Stateless Firewall
14. A technique for crashing by sending too much data to the buffer in a comuter's memory
Dumpster Diving
Buffer Overflow
PAT
Challenge
15. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Identification
DLP
Clickjacking
Authentication request
16. The protection of information from accidental or intentional misuse by persons inside or outside an organization
PAT
Subject
Information security
DLP
17. A threat that originates from outside the company. (ex. power failure.)
Information security
External Threat
Prevention and detection
Amart card
18. Can also capture transmissions that contain passwords.
Trojan-horse virus
Challenge
Digital Certificate
Protocol analyzer
19. ____ involves horizontally separating words - although it is still readable by the human eye.
Word Splitting
DAP
Hardware Attack
Data
20. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Open Port
History
Client_Hello
Challenge
21. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Authorization
Logic Bomb
Web security gateway
Script Kiddie
22. Pretending to be another person.
WEP (Wired Equivalent Privacy)
Impersonation
Cyberbullying
Internal Threat
23. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
History
Proximity reader
Content-Filtering Firewall
Cyberterrorist
24. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Extreme Humidity
Federated identity management
Replicating
25. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Symmetric encryption
Identity management
DLP
Session hijacking
26. Form of phishing that targets wealthy individuals.
Packet tampering
Security
Whaling
Extreme temperatures
27. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Wireless security
Fake Antivirus
Swiss Cheese
DNS Log
28. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Offline cracking
Cybercriminals
Buffer Overflow
RADIUS
29. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
DNS
Speech recognition
Authorization
Boot
30. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Logic Bomb
OAuth
Distributed Denial of Service (DDoS)
Man-in-the-Middle Attack
31. Floods a Web site with so many requests for service that it slows down or crashes the site
Denial of service attack
Evil Twin
Role
Locking Cabinets
32. Password and BioMetric
Wireless VLANs
Root
Fake Antivirus
Two factor security
33. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Challenge
Mouse Trapping
IEEE 802.1x
Physical security
34. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
computer footprint
Load balancing
Chain
Clickjacking
35. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Swiss Cheese
Eavesdropping Attack
BioMetric devices
What is asymmetic encryption?
36. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Cracker
Association request
Locking Cabinets
Electronic eavesdropping
37. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Firewalls
Password Crackers
IEEE 802.1x
Worm
38. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Identity management
Identity Theft
Standard biometrics
Amart card
39. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Biometrics
Flashing
MPack
Trusted OS
40. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
ACL
Encryption
Standard biometrics
41. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Private
CardSpace
Spimming
Replay Attack
42. How many past backups you keep - what you did on your machine etc.
History
Virtualization
ACL
Replicating
43. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Stateful packet filtering
Locking Cabinets
Blacklisting Software
Electronic Activist (hacktivist)
44. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Content-Filtering Firewall
Amart card
Server-Side
Character
45. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
DNS Hijacking
Rainbow Tables
War Driving
DNS Log
46. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
SYN Flood
Denial of service attack
White box
Environmental Threat
47. Web application attacks are considered ____ attacks.
Server-Side
Token
EAP
History
48. A private key and public key
What is asymmetic encryption?
Rainbow Tables
Character
Distributed storage
49. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Adware
WEP (Wired Equivalent Privacy)
Internal Threat
Electronic Activist (hacktivist)
50. Scrambles information into an alternative form that requires a key or password to decrypt the information
Sniffer
Encryption
Root
Extreme Humidity
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests