SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hides inside other software - usually as an attachment or a downloadable file
Identity Theft
Trojan-horse virus
VPN
Private
2. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Logic Bomb
Rogue
Root
Scatternet
3. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
Federated identity management
Malicious Insiders
Packet filtering
4. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Human memory
Backup scope
Geometric variance
Protocol analyzer
5. Due to the limitations of online guessing - most password attacks today use ____.
Offline cracking
Dumpster Diving
Macro
Brute Force Attack
6. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Cognitive biometrics
Resident
Distributed Denial of Service (DDoS)
Digital Certificate
7. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Stateless Firewall
Fencing
Script Kiddie
Access Control
8. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Client_Hello
Authentication request
Boot
CHAP (Challenge Handshake Authentication Protocol)
9. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Scatternet
Role
Amart card
Role Based Access Control
10. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Vishing
Flaming
Eavesdropping Attack
Rule Based Access Control
11. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
IEEE 802.1x
MPack
Private
Geometric variance
12. Often used for managing user access to one or more systems.
Rule Based Access Control
Challenge
Cybercriminals
CardSpace
13. A security analysis of the transaction within its approved context.
DLP
White box
Root
Content inspection
14. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
OAuth
WEP (Wired Equivalent Privacy)
computer footprint
Association request
15. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
SSO
Password Crackers
CardSpace
computer footprint
16. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Biometrics
Flaming
Orphaned
Malicious Insiders
17. Floods a Web site with so many requests for service that it slows down or crashes the site
Denial of service attack
Brute Force Attack
Chain
Scatternet
18. Can create entries in a log for all queries that are received.
Identity management
ACL
DNS Log
Federated identity management
19. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Role
CCTV
Content inspection
Social engineering
20. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Security
CardSpace
Mouse Trapping
Fencing
21. These accounts are user accounts that remain active after an employee has left an organization.
Hacker
Orphaned
Symmetric encryption
Floor Guard
22. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
WEP (Wired Equivalent Privacy)
Physical security access control measures
Root
23. Sending high volumes of UDP requests to a target.
Man-in-the-Middle Attack
UDP Flood
Symmetric encryption
Bluesnarfing
24. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
What is asymmetic encryption?
RADIUS
Smurf Attack
TCP/IP
25. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Swiss Cheese
Honeypot
Token
Trojan-horse virus
26. A technology that can help to evenly distribute work across a network.
Rootkit
Mouse Trapping
Load balancing
Cloud computing
27. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Roller barrier
Mantrap
Testing
MPack
28. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
Port Scanner
Replay Attack
Backup frequency
29. An attacker motivated by the ideology to attack computer or infrastructure networks.
Electronic eavesdropping
Cyberterrorist
Speech recognition
Worm
30. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
CardSpace
Man-made Threat
Biometrics
Authorization
31. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
DNS
DAP
Virus
OAuth
32. A private key and public key
DMS (Demilitarized Zone)
Role Based Access Control
Extreme temperatures
What is asymmetic encryption?
33. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Three-Way Handshake
Flashing
Floor Guard
LDAP injection
34. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Spoofing
Reverse proxy
Testing
35. Scrambles information into an alternative form that requires a key or password to decrypt the information
Encryption
Tailgate sensors
ARP Poisoning
Separation of duties
36. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Honeypot
ARP Poisoning
Spyware
War Driving
37. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Insiders
Internal Threat
Cognitive biometrics
Rainbow Tables
38. A technique for crashing by sending too much data to the buffer in a comuter's memory
Buffer Overflow
Sniffer
MPack
VPN
39. Wants to cause as much damage as possible - without a particular target or goal.
Dumpster Diving
Cybercriminals
Electronic Vandal
Hardware Attack
40. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
ACL (Access Control List)
WEP (Wired Equivalent Privacy)
Prevention and detection
Distributed storage
41. Pretending to be another person.
OAuth
Hacker
Impersonation
Rootkit
42. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Biometrics
Spimming
Adware
Authentication request
43. Users who access a Web server are usually restricted to the ____ directory.
Standard biometrics
Root
UDP Flood
Wireless VLANs
44. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Distributed storage
Whaling
Adware
Token
45. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Hardware Attack
Token
White Hat
Offline cracking
46. Lock - conduit - card key - video equipment - secured guard
Fake Antivirus
Physical security access control measures
Ciphertext
Human memory
47. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Cyber Theft
Roller barrier
TACACS
PAT
48. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Word Splitting
Resident
Root
DLP
49. The process of verifying that your backups actually work
Information security
Cognitive biometrics
Challenge
Testing
50. The process of giving someone permission to do or have something
Cognitive biometrics
Rainbow Tables
Authorization
Locking Cabinets