SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Physical security access control measures
Shoulder Surfing
BioMetric devices
Amart card
2. An attacker slips through a secure area following a legitimate employee.
Tailgating
Password Crackers
Password
LDAP injection
3. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Speech recognition
Hoaxes
DNS poisoning
Spyware
4. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
Authorization
Orphaned
Geometric variance
5. A ____ is a network set up with intentional vulnerabilities.
Honeynet
DAP
Protocol analyzer
Vishing
6. The time it takes for a key to be pressed and then released.
Dwell Time
Shoulder Surfing
CCTV
Tailgating
7. ____ is an image spam that is divided into multiple images.
GIF Layering
Dwell Time
Impersonation
Word Splitting
8. Users who access a Web server are usually restricted to the ____ directory.
Eavesdropping Attack
Root
Standard biometrics
Content inspection
9. Set of rules that allow or deny traffic
Backup scope
Packet filtering
Content filtering
WEP (Wired Equivalent Privacy)
10. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
ACL (Access Control List)
Router
Zone transfer
Roller barrier
11. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Two factor security
Mouse Trapping
Flaming
Sniffer
12. Software that can guess passwords
Symmetric encryption
Password Crackers
WEP (Wired Equivalent Privacy)
Association request
13. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
UDP Flood
Bluesnarfing
Malicious Insiders
Role
14. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Natural Threat
70
Bluejacking
Replicating
15. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Tailgating
70
WEP (Wired Equivalent Privacy)
RADIUS
16. Provides a greater degree of security by implementing port-based authentication.
Roller barrier
IEEE 802.1x
CardSpace
Drive-by Download
17. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
RADIUS
Stateful Firewall
Wireless security
Cyberterrorist
18. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Media for backups
Dwell Time
Ciphertext
Electronic Vandal
19. Sending high volumes of UDP requests to a target.
Cognitive biometrics
UDP Flood
LEAP
Hash encoding
20. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Bluejacking
Orphaned
Environmental Threat
Association request
21. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Two factor security
Cloud computing
Bluejacking
Stateful packet filtering
22. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
DNS Log
Cybercriminals
Smurf Attack
Cognitive biometrics
23. A variety of threats such as viruses - worms - and Trojan horses
Natural Threat
Malicious code
Virtualization
ARP Poisoning
24. A user accessing a computer system must present credentials or ____ when logging on to the system.
Account expiration
Virtualization
Identification
TCP/IP
25. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Insiders
Private
Honeynet
Biometrics
26. ____ attacks are responsible for half of all malware delivered by Web advertising.
Dumpster Diving
Rule Based Access Control
Fake Antivirus
Sniffer
27. Form of phishing that targets wealthy individuals.
Logic Bomb
Whaling
Web security gateway
Packet tampering
28. Forwards packets across computer networks.
Router
70
Stateful packet filtering
Evil Twin
29. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
WEP (Wired Equivalent Privacy)
CHAP (Challenge Handshake Authentication Protocol)
Geometric variance
Brute Force
30. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
Role
Load balancing
Open Port
31. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Extreme temperatures
Standard biometrics
PAT
ACL (Access Control List)
32. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Hacker
BioMetric devices
Cracker
Whaling
33. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Buffer Overflow
Drive-by Download
Smurf Attack
34. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
TCP/IP
DAC
Identification
Roller barrier
35. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Federated identity management
Man-in-the-Middle Attack
SYN Flood
Identity management
36. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Boot
Whaling
Malicious Insiders
Brute Force Attack
37. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
Role
Separation of duties
Bluejacking
38. A user under Role Based Access Control can be assigned only one ____.
Whaling
Chain
Offline cracking
Role
39. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Password Crackers
Man-made Threat
Stateful packet filtering
40. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Word Splitting
Virtualization
computer footprint
Worm
41. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Mouse Trapping
Load balancing
Environmental Threat
Stateless Firewall
42. Related to the perception - thought process - and understanding of the user.
Firewall logs
Cognitive biometrics
Token
Stateful Firewall
43. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Amart card
Wireless VLANs
Tailgate sensors
Internal Threat
44. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Extreme Humidity
computer footprint
War Driving
Swiss Cheese
45. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
PAT
Standard biometrics
Malicious Insiders
46. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Locking Cabinets
Rootkit
War Driving
Whaling
47. A security analysis of the transaction within its approved context.
Content inspection
Malicious code
Three-Way Handshake
Speech recognition
48. ____ involves horizontally separating words - although it is still readable by the human eye.
Hardware Attack
Electronic eavesdropping
Cipher locks
Word Splitting
49. Below 40% or above 50%
Extreme Humidity
Data
Phishing
Cyberterrorist
50. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
LEAP
Logic Bomb
Port Scanner
EAP