SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Offline cracking
Data
Replicating
Backup scope
2. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Association request
Cipher locks
Backup scope
Vishing
3. The weakness of passwords centers on ____.
Cyberterrorist
Bluesnarfing
Human memory
Testing
4. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
TCP/IP
Replay Attack
Macro
Spear Phishing
5. Pretending to be another person.
Impersonation
Federated identity management
BioMetric devices
Electronic Activist (hacktivist)
6. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Open Port
Root
Environmental Threat
ACL (Access Control List)
7. A group of piconets in which connections exist between different piconets is called a ____.
Scatternet
Rootkit
Electronic Vandal
Mandatory Access Control
8. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Brute Force Attack
Cognitive biometrics
Firewall logs
Offline cracking
9. Indicates when an account is no longer active.
Account expiration
Backup scope
Security
Brute Force
10. An attacker slips through a secure area following a legitimate employee.
Word Splitting
Private
Replicating
Tailgating
11. These attacks may allow an attacker to construct LDAP statements based on user input statements.
LDAP injection
Content filtering
Account expiration
Electronic Activist (hacktivist)
12. A framework for transporting authentication protocols instead of the authentication protocol itself.
Spyware
Distributed Denial of Service (DDoS)
Standard biometrics
EAP
13. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Session hijacking
Tailgate sensors
MPack
SSO
14. Web application attacks are considered ____ attacks.
BioMetric devices
Server-Side
Clickjacking
Distributed
15. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Separation of duties
Resident
Client_Hello
Virus
16. A pay-per-use computing model in which customers pay only for the computing resources they need.
TACACS
Server-Side
Rule Based Access Control
Cloud computing
17. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Impersonation
Replay
SSO
Logic Bomb
18. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Packet tampering
Separation of duties
Firewall logs
Root
19. Fingerprints and patterns
Security
Backup scope
BioMetric devices
Media for backups
20. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Stateful Firewall
ICMP Flood
Federated identity management
ACL (Access Control List)
21. A secret combination of letters - numbers - and/or characters that only the user should know.
Environmental Threat
Password
computer footprint
Adware
22. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
External Threat
Content inspection
Security
Flashing
23. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Extreme Humidity
Reverse proxy
Hardware Attack
Separation of duties
24. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
Kerberos
Roller barrier
Word Splitting
25. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Replicating
Password
Amart card
Cyberbullying
26. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Scatternet
Environmental Threat
DMS (Demilitarized Zone)
Bluesnarfing
27. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Wireless VLANs
Adware
ICMP Flood
28. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
Virus
Bluejacking
Flaming
29. ____ involves horizontally separating words - although it is still readable by the human eye.
Tailgating
DNS Hijacking
Rainbow Tables
Word Splitting
30. When DNS servers exchange information among themselves it is known as a ____.
War Driving
Human memory
Zone transfer
Mantrap
31. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Replay Attack
Mouse Trapping
Rainbow Tables
DNS
32. A private key and public key
Rogue
Worm
Firewall logs
What is asymmetic encryption?
33. A ____ is designed to separate a nonsecured area from a secured area.
Whaling
Mantrap
What is asymmetic encryption?
Amart card
34. Below 40% or above 50%
Extreme Humidity
Client_Hello
Access Control
Social engineering
35. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Server-Side
Amart card
Proximity reader
Character
36. An attack that forces a user to unintentionally click a link.
Identity Theft
Clickjacking
Hybird
WEP (Wired Equivalent Privacy)
37. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Macro
Speech recognition
Encryption
DAP
38. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Biometrics
Rogue
Eavesdropping Attack
Virus
39. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Cyberbullying
Chain
Brute Force Attack
40. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
TACACS
White Hat
Challenge
Mantrap
41. Due to the limitations of online guessing - most password attacks today use ____.
ACL (Access Control List)
Offline cracking
Authorization
Bluesnarfing
42. Form of phishing that targets wealthy individuals.
Whaling
Role Based Access Control
Evil Twin
Password
43. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Man-in-the-Middle Attack
Content filtering
Chain
Separation of duties
44. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Adware
Server-Side
Identification
Kerberos
45. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Cognitive biometrics
TCP/IP
Rootkit
Web security gateway
46. A firewall capable of monitoring a data stream from end to end.
Stateful Firewall
OAuth
Proximity reader
Eavesdropping Attack
47. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Replay
Clickjacking
Extreme temperatures
TCP/IP
48. Viruses and worms are said to be self-____.
Role
Replicating
Amart card
VPN
49. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Proximity reader
Rainbow Tables
Cyberstalking/Harassment
MPack
50. When organizations use software that filters content to prevent the transmission of unauthorized information
Standard biometrics
Insiders
Content filtering
VPN