SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Evil Twin
War Driving
Content inspection
Blacklisting Software
2. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Bluesnarfing
70
Bluesnarfing
Macro
3. A ____ is a network set up with intentional vulnerabilities.
Extreme temperatures
TCP/IP
Port Scanner
Honeynet
4. Set of rules that allow or deny traffic
CardSpace
Man-made Threat
Packet filtering
Evil Twin
5. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
VPN
Malicious Insiders
Malicious code
Packet tampering
6. Broadcast storms can be prevented with ____.
Loop Protection
Brute Force Attack
Password Crackers
Electronic Activist (hacktivist)
7. ____ can be prewired for electrical power as well as wired network connections.
Cyber Theft
Locking Cabinets
Role Based Access Control
Rootkit
8. A technique for crashing by sending too much data to the buffer in a comuter's memory
Content-Filtering Firewall
EAP
Mandatory Access Control
Buffer Overflow
9. ____ is an image spam that is divided into multiple images.
Bluesnarfing
Floor Guard
GIF Layering
Hardware Attack
10. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Orphaned
ACL
Logic Bomb
Encryption
11. A secret combination of letters - numbers - and/or characters that only the user should know.
LEAP
Password
Cloud computing
Authorization
12. The ____ model is the least restrictive.
Insiders
Dwell Time
Swiss Cheese
DAC
13. A user under Role Based Access Control can be assigned only one ____.
White box
ICMP Flood
Fencing
Role
14. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Rule Based Access Control
Content-Filtering Firewall
Whaling
15. A firewall capable of monitoring a data stream from end to end.
CCTV
Orphaned
IEEE 802.1x
Stateful Firewall
16. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Spimming
Data
Roller barrier
17. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Open Port
Dwell Time
Digital Certificate
Backup frequency
18. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
ACL (Access Control List)
Wireless VLANs
Honeynet
19. A ____ encrypts all data that is transmitted between the remote device and the network.
Two factor security
White Hat
VPN
DNS
20. A method for confirming users' identities
Authentication
Bluesnarfing
Electronic eavesdropping
Packet filtering
21. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Account expiration
ARP Poisoning
Physical security
SYN Flood
22. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
NAT
Spoofing
ARP Poisoning
Phishing
23. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Two factor security
Spoofing
Dwell Time
Buffer Overflow
24. Users who access a Web server are usually restricted to the ____ directory.
Evil Twin
Root
Bluejacking
Adware
25. Pretending to be another person.
Spoofing
Impersonation
Private
Open Port
26. A form of filtering that blocks only sites specified as harmful.
Bluejacking
Kerberos
OAuth
Blacklisting Software
27. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Brute Force Attack
Symmetric encryption
Distributed
Shoulder Surfing
28. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Evil Twin
computer footprint
Federated identity management
29. An AP that is set up by an attacker.
Offline cracking
Replay Attack
Evil Twin
Macro
30. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Spimming
Zone transfer
Root
Human memory
31. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Man-made Threat
Geometric variance
Private
Reverse proxy
32. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Password Crackers
Tailgate sensors
SYN Flood
DAC
33. How many past backups you keep - what you did on your machine etc.
History
Environmental Threat
Web security gateway
Electronic eavesdropping
34. Indicates when an account is no longer active.
Locking Cabinets
Replicating
Account expiration
Insiders
35. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Spyware
White Hat
Association request
Testing
36. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
RADIUS
Character
Hacker
37. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Chain
Worm
White Hat
Encryption
38. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Replicating
RADIUS
Vishing
Environmental Threat
39. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Man-in-the-Middle Attack
Bluesnarfing
Cognitive biometrics
40. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Internal Threat
White Hat
Cyber Theft
Worm
41. The most restrictive access control model is ____.
Port Scanner
Locking Cabinets
IEEE 802.1x
Mandatory Access Control
42. A ____ attack is similar to a passive man-in-the-middle attack.
Hardware Attack
Flashing
Replay
Identity management
43. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
WEP (Wired Equivalent Privacy)
Firewall logs
Insiders
Authentication
44. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
computer footprint
SYN Flood
DAP
45. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
WEP (Wired Equivalent Privacy)
Mantrap
Spimming
Federated identity management
46. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Identity Theft
ACL
Clickjacking
TCP/IP
47. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Resident
Ciphertext
Drive-by Download
Adware
48. Password and BioMetric
Orphaned
Extreme temperatures
Two factor security
Content inspection
49. A group of piconets in which connections exist between different piconets is called a ____.
Virus
Scatternet
Cyberterrorist
Geometric variance
50. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Tailgating
Role Based Access Control
Virtualization
Password Crackers