SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Floods a Web site with so many requests for service that it slows down or crashes the site
Mantrap
Denial of service attack
ICMP Flood
Hash encoding
2. The most restrictive access control model is ____.
Biometrics
Mandatory Access Control
Electronic Activist (hacktivist)
Data
3. Viruses and worms are said to be self-____.
Replicating
Role Based Access Control
Hybird
Root
4. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
IEEE 802.1x
Content filtering
Bluesnarfing
Root
5. A firewall capable of monitoring a data stream from end to end.
Stateful Firewall
Stateful packet filtering
Port Scanner
Content-Filtering Firewall
6. The process of verifying that your backups actually work
Brute Force Attack
Content inspection
Testing
BioMetric devices
7. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Extreme Humidity
Amart card
GIF Layering
Firewalls
8. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Chain
Reverse proxy
Packet filtering
Macro
9. The process of giving someone permission to do or have something
Open Port
Backup frequency
Resident
Authorization
10. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Root
Cipher locks
TACACS
CardSpace
11. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
CardSpace
Floor Guard
Packet tampering
Backup scope
12. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Private
Standard biometrics
PAT
Social engineering
13. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Wireless security
Digital Certificate
Media for backups
Security
14. Below 70 degrees or above 75 degrees
Character
Cyber Theft
Encryption
Extreme temperatures
15. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
EAP
DNS poisoning
Hash encoding
16. Software that can guess passwords
Cybercriminals
Password Crackers
CCTV
Session hijacking
17. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Proximity reader
Smurf Attack
NAT
Extreme Humidity
18. Can create entries in a log for all queries that are received.
DNS Log
Hash encoding
Federated identity management
Token
19. Due to the limitations of online guessing - most password attacks today use ____.
Protocol analyzer
Open Port
Macro
Offline cracking
20. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Challenge
Digital Certificate
Standard biometrics
Boot
21. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Hoaxes
LDAP injection
Mouse Trapping
Access Control
22. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
Authorization
Prevention and detection
Fencing
23. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Trusted OS
Adware
Packet filtering
Eavesdropping Attack
24. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
DNS
What is asymmetic encryption?
Social engineering
Geometric variance
25. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Whaling
DNS
Electronic eavesdropping
Bluesnarfing
26. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Two factor security
Honeypot
Chain
Brute Force
27. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Phishing
DAC
Chain
CardSpace
28. Requires mutual authentication used for WLAN encryption using Cisco client software.
LEAP
Cloud computing
ACL (Access Control List)
EAP
29. Pretending to be another person.
Impersonation
Word Splitting
PAT
TACACS
30. Wants to cause as much damage as possible - without a particular target or goal.
Rainbow Tables
Rootkit
Electronic Vandal
Human memory
31. Four interrelated aspects to _________:Access - data - infrastructure - computers
Account expiration
Logic Bomb
Subject
Physical security
32. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Electronic eavesdropping
Information security
UDP Flood
Scatternet
33. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Macro
Authorization
Stateful packet filtering
Backup frequency
34. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Data
UDP Flood
Packet filtering
DNS Hijacking
35. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Man-in-the-Middle Attack
ACL (Access Control List)
SSO
Biometrics
36. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Root
Authentication request
Natural Threat
Swiss Cheese
37. The ____ model is the least restrictive.
Trusted OS
Port Scanner
DAC
Social engineering
38. A ____ encrypts all data that is transmitted between the remote device and the network.
VPN
DNS Log
Dumpster Diving
GIF Layering
39. Hides inside other software - usually as an attachment or a downloadable file
Blacklisting Software
Trojan-horse virus
Firewall logs
Web security gateway
40. A private key and public key
OAuth
What is asymmetic encryption?
White Hat
Trojan-horse virus
41. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Client_Hello
Offline cracking
Phishing
ICMP Flood
42. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Hardware Attack
Root
Rule Based Access Control
Worm
43. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
SYN Flood
MPack
Whaling
DNS poisoning
44. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Cyberstalking/Harassment
Hacker
CCTV
Firewalls
45. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Cyberterrorist
Locking Cabinets
Client_Hello
70
46. Small electronic devices that change user passwords automatically
TCP/IP
Token
Roller barrier
Ciphertext
47. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Drive-by Download
Stateful packet filtering
Eavesdropping Attack
computer footprint
48. Ensures that messages are not corrupt or tampered with
Hash encoding
History
ACL
Electronic eavesdropping
49. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Session hijacking
Shoulder Surfing
Open Port
Authorization
50. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Account expiration
DNS
Subject
ICMP Flood