SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A security analysis of the transaction within its approved context.
Content inspection
Standard biometrics
Cipher locks
Wireless VLANs
2. An attacker slips through a secure area following a legitimate employee.
Open Port
Tailgating
Prevention and detection
Dumpster Diving
3. The time it takes for a key to be pressed and then released.
Honeynet
Chain
Dwell Time
Replay
4. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Chain
Session hijacking
Shoulder Surfing
Offline cracking
5. Sending high volumes of UDP requests to a target.
UDP Flood
OAuth
Chain
Two factor security
6. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Brute Force
Script Kiddie
Whaling
Physical security access control measures
7. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
VPN
Insiders
Standard biometrics
Federated identity management
8. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Character
Replay Attack
Honeynet
DAP
9. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Character
NAT
Speech recognition
Reverse proxy
10. Hides inside other software - usually as an attachment or a downloadable file
Hybird
Encryption
Trojan-horse virus
Cipher locks
11. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Packet filtering
Electronic Activist (hacktivist)
Load balancing
12. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Distributed Denial of Service (DDoS)
Cracker
Denial of service attack
PAT
13. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
CHAP (Challenge Handshake Authentication Protocol)
Sniffer
Identity management
Roller barrier
14. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
DLP
Stateless Firewall
Identity Theft
15. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Stateless Firewall
Digital Certificate
ARP Poisoning
Federated identity management
16. When DNS servers exchange information among themselves it is known as a ____.
What is asymmetic encryption?
Evil Twin
Zone transfer
Spear Phishing
17. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Account expiration
White box
Password Crackers
18. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Offline cracking
Electronic Activist (hacktivist)
Dwell Time
Tailgate sensors
19. These accounts are user accounts that remain active after an employee has left an organization.
Bluejacking
CCTV
Orphaned
Cracker
20. How secure the data in your backups is-can use physical security or encryption
Backup frequency
RADIUS
Mantrap
Security
21. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
TCP/IP
Data
Distributed
White Hat
22. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Smurf Attack
Kerberos
PAT
Natural Threat
23. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Flaming
DLP
Subject
Content filtering
24. A ____ is designed to separate a nonsecured area from a secured area.
Distributed Denial of Service (DDoS)
Mantrap
Hash encoding
ICMP Flood
25. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Malicious Insiders
Cyberterrorist
WEP (Wired Equivalent Privacy)
DMS (Demilitarized Zone)
26. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Stateful packet filtering
Dwell Time
SSO
Content filtering
27. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
SYN Flood
Standard biometrics
Subject
Packet tampering
28. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
VPN
Tailgating
Floor Guard
Spoofing
29. When organizations use software that filters content to prevent the transmission of unauthorized information
Session hijacking
Bluesnarfing
Macro
Content filtering
30. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Amart card
DNS Log
UDP Flood
Buffer Overflow
31. Allows a single access point to service different types of users.
Security
War Driving
Wireless VLANs
Token
32. Software that can guess passwords
Password Crackers
Impersonation
CCTV
Amart card
33. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Resident
Orphaned
Tailgate sensors
Eavesdropping Attack
34. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
LEAP
LDAP injection
DLP
Floor Guard
35. A user accessing a computer system must present credentials or ____ when logging on to the system.
MPack
Identification
Virus
Man-made Threat
36. ____ attacks are responsible for half of all malware delivered by Web advertising.
Cloud computing
Encryption
Fake Antivirus
Wireless security
37. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
Stateful packet filtering
Encryption
DLP
38. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Whaling
Fake Antivirus
Malicious Insiders
Web security gateway
39. Using a single authentication credential that is shared across multiple networks.
Replay Attack
Floor Guard
Identity management
Private
40. A pay-per-use computing model in which customers pay only for the computing resources they need.
LEAP
Cloud computing
Operation
Cracker
41. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluesnarfing
Bluejacking
Scatternet
Testing
42. Securing a restricted area by erecting a barrier is called ____.
Wireless security
Reverse proxy
Fencing
Proximity reader
43. A secret combination of letters - numbers - and/or characters that only the user should know.
Role Based Access Control
Scatternet
Password
Private
44. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Rainbow Tables
Stateless Firewall
Wireless VLANs
Identification
45. The process of verifying that your backups actually work
Dumpster Diving
Backup scope
Testing
Social engineering
46. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Subject
Password Crackers
Private
Bluejacking
47. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Server-Side
Information security
UDP Flood
Distributed storage
48. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
CardSpace
Content-Filtering Firewall
Cyberbullying
Electronic eavesdropping
49. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Rule Based Access Control
Firewall logs
Honeypot
Identity management
50. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Digital Certificate
CardSpace
Cognitive biometrics
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests