SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Hybird
Internal Threat
MPack
Kerberos
2. Broadcast storms can be prevented with ____.
DAC
Stateful packet filtering
Root
Loop Protection
3. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Packet tampering
OAuth
Firewall logs
Social engineering
4. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Macro
ARP Poisoning
70
Separation of duties
5. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Challenge
Biometrics
Load balancing
6. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Shoulder Surfing
Replay Attack
Brute Force Attack
Insiders
7. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Server-Side
Packet tampering
VPN
Floor Guard
8. It is able to code and decode data
Operation
DNS Hijacking
computer footprint
Symmetric encryption
9. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Denial of service attack
Honeynet
Virus
Logic Bomb
10. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Client_Hello
Packet filtering
Cognitive biometrics
TACACS
11. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
computer footprint
Chain
Distributed Denial of Service (DDoS)
Logic Bomb
12. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Protocol analyzer
LDAP injection
Smurf Attack
Spoofing
13. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Rule Based Access Control
Session hijacking
Media for backups
TCP/IP
14. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Encryption
Offline cracking
SSO
Stateful packet filtering
15. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Cybercriminals
Mouse Trapping
Rootkit
Electronic Vandal
16. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
RADIUS
Geometric variance
Association request
ICMP Flood
17. A technique for crashing by sending too much data to the buffer in a comuter's memory
70
ACL (Access Control List)
Buffer Overflow
computer footprint
18. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Blacklisting Software
Bluejacking
Replay
Separation of duties
19. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Virus
Hacker
DLP
Distributed Denial of Service (DDoS)
20. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
TACACS
Hoaxes
Backup scope
LEAP
21. Wants to cause as much damage as possible - without a particular target or goal.
Human memory
Backup frequency
Electronic Vandal
Wireless VLANs
22. ____ attacks are responsible for half of all malware delivered by Web advertising.
Malicious Insiders
Fake Antivirus
Digital Certificate
Private
23. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Content-Filtering Firewall
Worm
Authentication request
Character
24. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Whaling
Federated identity management
Loop Protection
Private
25. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Content-Filtering Firewall
Worm
Honeypot
Flashing
26. An authentication process that involves three steps.
Stateful packet filtering
Three-Way Handshake
Cyberterrorist
Electronic Activist (hacktivist)
27. Below 40% or above 50%
What is asymmetic encryption?
Load balancing
IEEE 802.1x
Extreme Humidity
28. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Security
Extreme temperatures
Worm
Social engineering
29. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Authorization
Shoulder Surfing
Distributed
Eavesdropping Attack
30. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
LDAP injection
ACL (Access Control List)
What is asymmetic encryption?
31. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Flashing
What is asymmetic encryption?
Identification
RADIUS
32. Ensures that messages are not corrupt or tampered with
ICMP Flood
Three-Way Handshake
Hash encoding
Flaming
33. Could become a key element in authentication in the future.
Denial of service attack
Cognitive biometrics
Human memory
DNS poisoning
34. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Resident
Natural Threat
DNS Log
Association request
35. Web application attacks are considered ____ attacks.
Whaling
Electronic eavesdropping
Server-Side
Password Crackers
36. Password and BioMetric
Script Kiddie
Two factor security
Role
Floor Guard
37. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Reverse proxy
Smurf Attack
Role
DMS (Demilitarized Zone)
38. Using a single authentication credential that is shared across multiple networks.
Client_Hello
Identity management
DNS
MPack
39. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Reverse proxy
Malicious code
Scatternet
Distributed
40. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
computer footprint
Drive-by Download
Man-in-the-Middle Attack
White box
41. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Data
LDAP injection
Rule Based Access Control
42. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Symmetric encryption
Bluesnarfing
Loop Protection
Natural Threat
43. An attacker slips through a secure area following a legitimate employee.
Encryption
Speech recognition
Tailgating
Chain
44. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Password
Bluejacking
Phishing
Media for backups
45. ____ involves horizontally separating words - although it is still readable by the human eye.
Extreme temperatures
LDAP injection
Word Splitting
Association request
46. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Role Based Access Control
Distributed storage
Offline cracking
Physical security access control measures
47. Can also capture transmissions that contain passwords.
Smurf Attack
Protocol analyzer
Authentication request
Replay Attack
48. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Speech recognition
DNS Log
Client_Hello
Spyware
49. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Honeypot
Wireless security
Load balancing
Locking Cabinets
50. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Character
DAC
Chain
DMS (Demilitarized Zone)