SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer crimes involving the theft of money
DNS
Roller barrier
Cyber Theft
LEAP
2. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Bluesnarfing
Black Hat
SYN Flood
3. A set of permissions that are attached to an object.
Role Based Access Control
Security
ACL
PAT
4. An attack that forces a user to unintentionally click a link.
Speech recognition
Clickjacking
Client_Hello
Biometrics
5. Web application attacks are considered ____ attacks.
Association request
Offline cracking
IEEE 802.1x
Server-Side
6. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
DNS poisoning
Separation of duties
Ciphertext
Insiders
7. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Mandatory Access Control
Standard biometrics
LEAP
Cognitive biometrics
8. A variety of threats such as viruses - worms - and Trojan horses
Malicious code
TCP/IP
Stateful packet filtering
Web security gateway
9. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Spyware
Man-in-the-Middle Attack
Brute Force
Rule Based Access Control
10. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Spear Phishing
70
BioMetric devices
Trojan-horse virus
11. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Black Hat
Load balancing
Macro
Standard biometrics
12. Related to the perception - thought process - and understanding of the user.
Cyberbullying
Distributed Denial of Service (DDoS)
Dumpster Diving
Cognitive biometrics
13. Can also capture transmissions that contain passwords.
Distributed Denial of Service (DDoS)
Protocol analyzer
Media for backups
Cyberstalking/Harassment
14. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
70
Two factor security
Clickjacking
Resident
15. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Rogue
Logic Bomb
WEP (Wired Equivalent Privacy)
Trusted OS
16. Due to the limitations of online guessing - most password attacks today use ____.
History
Amart card
Offline cracking
Replay
17. People very knowledgeable about computers who use their knowledge to invade other people's computers
Trusted OS
Server-Side
Bluejacking
Hacker
18. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Sniffer
Subject
What is asymmetic encryption?
Worm
19. Wants to cause as much damage as possible - without a particular target or goal.
Bluesnarfing
Honeynet
Electronic Vandal
Mouse Trapping
20. The ____ model is the least restrictive.
Cyberbullying
DAC
Client_Hello
Dumpster Diving
21. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Rainbow Tables
Logic Bomb
Security
Firewalls
22. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Tailgating
CCTV
Rule Based Access Control
Drive-by Download
23. The most restrictive access control model is ____.
Mandatory Access Control
LEAP
Token
Dwell Time
24. Often used for managing user access to one or more systems.
History
computer footprint
Packet filtering
Rule Based Access Control
25. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Extreme temperatures
Phishing
Port Scanner
Rainbow Tables
26. Can create entries in a log for all queries that are received.
Vishing
Load balancing
Electronic eavesdropping
DNS Log
27. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Environmental Threat
PAT
Testing
Floor Guard
28. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Open Port
Authentication
Proximity reader
Subject
29. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Association request
Electronic eavesdropping
Malicious Insiders
Worm
30. ____ involves horizontally separating words - although it is still readable by the human eye.
EAP
Electronic eavesdropping
Web security gateway
Word Splitting
31. Requires mutual authentication used for WLAN encryption using Cisco client software.
Information security
Content inspection
Shoulder Surfing
LEAP
32. A technique that allows private IP addresses to be used on the public Internet.
Denial of service attack
Symmetric encryption
Speech recognition
NAT
33. Indicates when an account is no longer active.
Two factor security
Rule Based Access Control
Boot
Account expiration
34. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Private
Replay Attack
IEEE 802.1x
ARP Poisoning
35. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
DNS Hijacking
Identity management
Tailgate sensors
Encryption
36. A method for confirming users' identities
Worm
Malicious code
Authentication
Virtualization
37. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Distributed
War Driving
Chain
38. An attacker slips through a secure area following a legitimate employee.
Tailgating
EAP
Encryption
LDAP injection
39. Broadcast storms can be prevented with ____.
Loop Protection
RADIUS
Rogue
Smurf Attack
40. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
Malicious code
Honeynet
WEP (Wired Equivalent Privacy)
41. A ____ attack is similar to a passive man-in-the-middle attack.
Adware
Phishing
Replay
Script Kiddie
42. It accepts spoken words for input as if they had been typed on the keyboard.
Loop Protection
Social engineering
White box
Speech recognition
43. Below 40% or above 50%
DAC
Brute Force Attack
Extreme Humidity
Proximity reader
44. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Data
Identity Theft
Hash encoding
Spoofing
45. The process of verifying that your backups actually work
DAC
Honeypot
Testing
Cyberterrorist
46. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
White Hat
CardSpace
Replay Attack
Virus
47. A ____ is a network set up with intentional vulnerabilities.
Session hijacking
Cloud computing
Honeynet
Prevention and detection
48. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
EAP
Hybird
History
Orphaned
49. How secure the data in your backups is-can use physical security or encryption
Security
Content inspection
UDP Flood
CCTV
50. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Virus
Replay Attack
Black Hat
Impersonation