SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The geographical storage of your backups-safest place is a different place from where you keep your actual data
External Threat
Replicating
Rootkit
Distributed storage
2. Form of phishing that targets wealthy individuals.
Account expiration
Whaling
ACL
SYN Flood
3. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Insiders
DNS Log
Cracker
VPN
4. The process of giving someone permission to do or have something
Stateful packet filtering
Password
Authorization
ACL (Access Control List)
5. A secret combination of letters - numbers - and/or characters that only the user should know.
Password
Information security
Content inspection
Stateless Firewall
6. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Authentication
computer footprint
Hybird
Data
7. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Script Kiddie
SYN Flood
Cloud computing
Kerberos
8. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
CardSpace
CCTV
Drive-by Download
Tailgating
9. A technique that allows private IP addresses to be used on the public Internet.
RADIUS
War Driving
NAT
Content inspection
10. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
Malicious Insiders
TACACS
Hybird
11. The action that is taken by the subject over the object is called a ____.
Sniffer
Password Crackers
Operation
Challenge
12. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
DLP
PAT
CCTV
13. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Stateful Firewall
CCTV
Spimming
Spear Phishing
14. Floods a Web site with so many requests for service that it slows down or crashes the site
CardSpace
Identity management
Denial of service attack
Man-made Threat
15. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
DNS Log
Firewalls
White box
Cognitive biometrics
16. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Client_Hello
Cyberterrorist
Orphaned
Bluesnarfing
17. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Extreme Humidity
Firewalls
Chain
18. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Sniffer
Firewalls
Password
Man-made Threat
19. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Locking Cabinets
Port Scanner
Eavesdropping Attack
Media for backups
20. A ____ is a network set up with intentional vulnerabilities.
Authentication request
Natural Threat
Mouse Trapping
Honeynet
21. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Authorization
Rainbow Tables
Roller barrier
MPack
22. ____ can be prewired for electrical power as well as wired network connections.
LDAP injection
Association request
Locking Cabinets
Rule Based Access Control
23. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Prevention and detection
Social engineering
Web security gateway
Distributed Denial of Service (DDoS)
24. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Tailgate sensors
Cybercriminals
Human memory
White Hat
25. ____ is an image spam that is divided into multiple images.
GIF Layering
Physical security
Locking Cabinets
DMS (Demilitarized Zone)
26. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Rogue
Access Control
DNS Hijacking
Brute Force
27. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Cyberterrorist
Bluejacking
Flashing
Internal Threat
28. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Distributed
Media for backups
Identity management
Distributed Denial of Service (DDoS)
29. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
DNS Log
Honeypot
Electronic Activist (hacktivist)
Router
30. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Hash encoding
Phishing
ACL (Access Control List)
Session hijacking
31. The process of verifying that your backups actually work
Testing
Kerberos
Whaling
Replay Attack
32. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
BioMetric devices
Distributed
Rule Based Access Control
PAT
33. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Identity management
Prevention and detection
Stateless Firewall
Malicious Insiders
34. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Internal Threat
Eavesdropping Attack
Server-Side
Script Kiddie
35. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Brute Force
Distributed Denial of Service (DDoS)
Roller barrier
Standard biometrics
36. Due to the limitations of online guessing - most password attacks today use ____.
RADIUS
Man-made Threat
Offline cracking
Authorization
37. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
BioMetric devices
Client_Hello
Roller barrier
Mandatory Access Control
38. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Trusted OS
Firewalls
DAC
WEP (Wired Equivalent Privacy)
39. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Authentication
Shoulder Surfing
Testing
Natural Threat
40. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Electronic eavesdropping
Security
Replay
Role Based Access Control
41. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Cyber Theft
WEP (Wired Equivalent Privacy)
White Hat
Macro
42. ____ attacks are responsible for half of all malware delivered by Web advertising.
Internal Threat
ICMP Flood
Fake Antivirus
Cipher locks
43. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Session hijacking
Information security
Rogue
Word Splitting
44. Web application attacks are considered ____ attacks.
Cyber Theft
Virus
Server-Side
Token
45. Computer crimes involving the theft of money
ICMP Flood
Impersonation
Replicating
Cyber Theft
46. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cyberbullying
Load balancing
Man-made Threat
ACL (Access Control List)
47. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Stateless Firewall
Cognitive biometrics
Malicious code
Virtualization
48. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Script Kiddie
Wireless VLANs
Open Port
Association request
49. An attack that forces a user to unintentionally click a link.
Rainbow Tables
ARP Poisoning
VPN
Clickjacking
50. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Vishing
Sniffer
Testing
Stateless Firewall
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests