SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Packet filtering
Flaming
Identity Theft
Replicating
2. A ____ attack is similar to a passive man-in-the-middle attack.
Chain
Replay
Identity Theft
Digital Certificate
3. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Operation
Spear Phishing
Standard biometrics
Phishing
4. An attack that forces a user to unintentionally click a link.
Cipher locks
Distributed Denial of Service (DDoS)
Clickjacking
Open Port
5. An AP that is set up by an attacker.
TCP/IP
Evil Twin
ARP Poisoning
Backup frequency
6. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Authorization
70
Password
Malicious Insiders
7. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Logic Bomb
Distributed Denial of Service (DDoS)
Bluejacking
Account expiration
8. A ____ encrypts all data that is transmitted between the remote device and the network.
Drive-by Download
Hacker
VPN
Electronic Vandal
9. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Password Crackers
MPack
Social engineering
Information security
10. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
CHAP (Challenge Handshake Authentication Protocol)
Role
Sniffer
Fake Antivirus
11. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Brute Force
Extreme temperatures
DLP
DMS (Demilitarized Zone)
12. The ____ model is the least restrictive.
Evil Twin
Natural Threat
Router
DAC
13. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Character
Wireless VLANs
Wireless security
Natural Threat
14. Ensures that messages are not corrupt or tampered with
OAuth
Hash encoding
Virtualization
History
15. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Authentication
Virus
Tailgate sensors
Cracker
16. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Packet tampering
Roller barrier
Rootkit
Environmental Threat
17. Due to the limitations of online guessing - most password attacks today use ____.
Extreme Humidity
IEEE 802.1x
Offline cracking
Spear Phishing
18. Viruses and worms are said to be self-____.
Macro
Replicating
Content inspection
Fake Antivirus
19. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Malicious Insiders
Root
DLP
Honeypot
20. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Stateful packet filtering
Hybird
Resident
Dumpster Diving
21. The action that is taken by the subject over the object is called a ____.
Content inspection
Operation
Encryption
RADIUS
22. Set of rules that allow or deny traffic
Packet filtering
Insiders
Virtualization
DNS Hijacking
23. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
CardSpace
War Driving
Web security gateway
Eavesdropping Attack
24. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
NAT
Boot
Replay
Hoaxes
25. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Password
Electronic eavesdropping
Loop Protection
ARP Poisoning
26. A group of piconets in which connections exist between different piconets is called a ____.
Packet tampering
Open Port
Scatternet
Separation of duties
27. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
VPN
CardSpace
Data
Roller barrier
28. A firewall that can block designated types of traffic from entering a protected network.
Script Kiddie
Content-Filtering Firewall
Spimming
Standard biometrics
29. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Virus
Hash encoding
Rule Based Access Control
PAT
30. When organizations use software that filters content to prevent the transmission of unauthorized information
Roller barrier
Mandatory Access Control
GIF Layering
Content filtering
31. The time it takes for a key to be pressed and then released.
Content-Filtering Firewall
WEP (Wired Equivalent Privacy)
Dwell Time
Distributed storage
32. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cognitive biometrics
Spimming
NAT
Cyberbullying
33. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Cognitive biometrics
Hybird
DMS (Demilitarized Zone)
Open Port
34. A commonly used technique by pornography sites where a user gets "locked" in a web site.
War Driving
Mouse Trapping
EAP
Whaling
35. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Evil Twin
Replicating
WEP (Wired Equivalent Privacy)
Cyberbullying
36. An attack that sends unsolicited messages to Bluetooth-enabled devices.
TCP/IP
Identity management
Man-in-the-Middle Attack
Bluejacking
37. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Cognitive biometrics
Spyware
Trojan-horse virus
SYN Flood
38. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Tailgating
Environmental Threat
Cyberbullying
TACACS
39. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Phishing
Association request
Hoaxes
Cipher locks
40. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Reverse proxy
Account expiration
Shoulder Surfing
TACACS
41. A ____ virus infects the Master Boot Record of a hard disk drive.
Boot
Distributed Denial of Service (DDoS)
Packet filtering
Script Kiddie
42. Wants to cause as much damage as possible - without a particular target or goal.
ACL (Access Control List)
History
Natural Threat
Electronic Vandal
43. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Digital Certificate
Identification
Subject
Cyber Theft
44. A ____ is a network set up with intentional vulnerabilities.
Orphaned
Zone transfer
Port Scanner
Honeynet
45. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
ICMP Flood
Biometrics
Cyberterrorist
White box
46. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Vishing
Security
White box
Spear Phishing
47. An attacker motivated by the ideology to attack computer or infrastructure networks.
Cipher locks
Cyberterrorist
VPN
Port Scanner
48. ____ can be prewired for electrical power as well as wired network connections.
Locking Cabinets
Insiders
Server-Side
Standard biometrics
49. A security analysis of the transaction within its approved context.
Replay Attack
Content inspection
UDP Flood
Port Scanner
50. ____ is an image spam that is divided into multiple images.
Extreme temperatures
Distributed Denial of Service (DDoS)
Challenge
GIF Layering