SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Four interrelated aspects to _________:Access - data - infrastructure - computers
Backup scope
CHAP (Challenge Handshake Authentication Protocol)
Separation of duties
Physical security
2. Pretending to be another person.
Authentication request
Impersonation
Backup scope
Virtualization
3. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
Human memory
Stateful packet filtering
Man-made Threat
4. A method for confirming users' identities
Tailgating
Authentication
Sniffer
IEEE 802.1x
5. Due to the limitations of online guessing - most password attacks today use ____.
Distributed Denial of Service (DDoS)
Offline cracking
VPN
Cloud computing
6. The most restrictive access control model is ____.
Cloud computing
Mandatory Access Control
Tailgating
Shoulder Surfing
7. A user under Role Based Access Control can be assigned only one ____.
Role
Stateful packet filtering
Stateless Firewall
Backup frequency
8. An attack that sends unsolicited messages to Bluetooth-enabled devices.
computer footprint
Bluejacking
ARP Poisoning
Cloud computing
9. A technology that can help to evenly distribute work across a network.
Authentication request
Bluesnarfing
Load balancing
Content filtering
10. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
SSO
WEP (Wired Equivalent Privacy)
Protocol analyzer
11. Requires mutual authentication used for WLAN encryption using Cisco client software.
BioMetric devices
LEAP
Packet tampering
DAC
12. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Backup scope
Speech recognition
Replay
Cipher locks
13. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Stateful packet filtering
ICMP Flood
Environmental Threat
Phishing
14. The ____ model is the least restrictive.
DAC
Environmental Threat
Access Control
Identity management
15. Below 70 degrees or above 75 degrees
Cognitive biometrics
BioMetric devices
Man-in-the-Middle Attack
Extreme temperatures
16. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
TCP/IP
Backup scope
UDP Flood
Trojan-horse virus
17. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Replicating
IEEE 802.1x
Prevention and detection
Association request
18. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Mandatory Access Control
CardSpace
Loop Protection
Session hijacking
19. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
IEEE 802.1x
Hardware Attack
Reverse proxy
Man-made Threat
20. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Password Crackers
Man-in-the-Middle Attack
Operation
CHAP (Challenge Handshake Authentication Protocol)
21. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cyberbullying
CardSpace
Black Hat
Private
22. The time it takes for a key to be pressed and then released.
Loop Protection
Drive-by Download
Dwell Time
CCTV
23. A framework for transporting authentication protocols instead of the authentication protocol itself.
Biometrics
ACL
Client_Hello
EAP
24. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Spimming
DNS
Password Crackers
25. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Identity Theft
Man-in-the-Middle Attack
What is asymmetic encryption?
SSO
26. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Mandatory Access Control
Spear Phishing
Smurf Attack
Clickjacking
27. An attacker motivated by the ideology to attack computer or infrastructure networks.
Standard biometrics
Dumpster Diving
Cyberterrorist
Authentication request
28. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Fencing
MPack
Content inspection
Proximity reader
29. A technique for crashing by sending too much data to the buffer in a comuter's memory
Buffer Overflow
Load balancing
Bluesnarfing
DNS poisoning
30. How secure the data in your backups is-can use physical security or encryption
Hybird
Security
DNS Hijacking
Ciphertext
31. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DNS Log
DAP
Prevention and detection
Digital Certificate
32. Content filtering - encryption - firewalls
Packet tampering
Authentication
What is asymmetic encryption?
Prevention and detection
33. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Clickjacking
Three-Way Handshake
Information security
Cyberterrorist
34. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Distributed storage
Reverse proxy
Evil Twin
35. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Shoulder Surfing
Phishing
Mouse Trapping
Mantrap
36. How many past backups you keep - what you did on your machine etc.
History
Macro
Electronic Activist (hacktivist)
Cognitive biometrics
37. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Black Hat
Man-in-the-Middle Attack
Content-Filtering Firewall
DAC
38. Below 40% or above 50%
Brute Force
Extreme temperatures
RADIUS
Extreme Humidity
39. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
DAP
Virus
DNS Hijacking
Kerberos
40. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Flaming
Whaling
Replay Attack
Password
41. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Security
Load balancing
Mouse Trapping
WEP (Wired Equivalent Privacy)
42. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Port Scanner
TACACS
Blacklisting Software
Dwell Time
43. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Rootkit
Bluesnarfing
TCP/IP
Whaling
44. ____ can be prewired for electrical power as well as wired network connections.
Wireless VLANs
Locking Cabinets
What is asymmetic encryption?
Tailgate sensors
45. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Stateful Firewall
Flaming
Bluesnarfing
Cyberterrorist
46. Can create entries in a log for all queries that are received.
DAP
DNS Log
Swiss Cheese
Human memory
47. Software that can guess passwords
Flaming
Environmental Threat
Password Crackers
Distributed
48. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
IEEE 802.1x
Bluesnarfing
Backup scope
EAP
49. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Macro
Swiss Cheese
Password
Electronic Vandal
50. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Content inspection
Sniffer
Swiss Cheese
Cyber Theft
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests