SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Wireless security
Smurf Attack
Virus
Port Scanner
2. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Fencing
Content inspection
Mouse Trapping
Blacklisting Software
3. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Brute Force Attack
Resident
Server-Side
OAuth
4. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
DNS Hijacking
Wireless VLANs
Association request
Human memory
5. The ____ model is the least restrictive.
DAC
Cyberbullying
Roller barrier
Stateful Firewall
6. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
DLP
Orphaned
Resident
Federated identity management
7. Below 70 degrees or above 75 degrees
Packet filtering
Impersonation
Testing
Extreme temperatures
8. Scrambles information into an alternative form that requires a key or password to decrypt the information
Electronic eavesdropping
Root
Encryption
Port Scanner
9. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Adware
Firewall logs
Mandatory Access Control
Role Based Access Control
10. Provides a greater degree of security by implementing port-based authentication.
Denial of service attack
Replay Attack
IEEE 802.1x
Distributed
11. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Federated identity management
Rule Based Access Control
Man-in-the-Middle Attack
Blacklisting Software
12. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Natural Threat
Private
Cyberterrorist
Role Based Access Control
13. ____ attacks are responsible for half of all malware delivered by Web advertising.
Malicious code
Fake Antivirus
Open Port
Firewalls
14. A user under Role Based Access Control can be assigned only one ____.
Wireless VLANs
Encryption
Role
Password Crackers
15. Fingerprints and patterns
BioMetric devices
Separation of duties
Identification
computer footprint
16. A private key and public key
Security
Authentication
What is asymmetic encryption?
White box
17. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Association request
Content-Filtering Firewall
Firewall logs
Adware
18. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Challenge
Stateless Firewall
Reverse proxy
Cyberterrorist
19. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Whaling
WEP (Wired Equivalent Privacy)
Smurf Attack
Stateful packet filtering
20. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
MPack
Spear Phishing
Mouse Trapping
Open Port
21. Set of rules that allow or deny traffic
Load balancing
Packet filtering
Wireless security
LDAP injection
22. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Protocol analyzer
Stateful Firewall
RADIUS
Spoofing
23. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
SYN Flood
DNS
Replay Attack
Biometrics
24. When organizations use software that filters content to prevent the transmission of unauthorized information
Spear Phishing
Media for backups
Content filtering
DMS (Demilitarized Zone)
25. Sifting through a company's garbage to find information to help break into their computers
Dumpster Diving
Honeynet
Load balancing
SSO
26. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Hardware Attack
Speech recognition
Prevention and detection
Root
27. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Logic Bomb
Character
Clickjacking
Replay Attack
28. Viruses and worms are said to be self-____.
Virus
Encryption
Trojan-horse virus
Replicating
29. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Stateful packet filtering
ACL
Biometrics
Floor Guard
30. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Reverse proxy
DNS poisoning
Natural Threat
Bluesnarfing
31. ____ can be prewired for electrical power as well as wired network connections.
Bluesnarfing
DAC
Locking Cabinets
UDP Flood
32. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Client_Hello
Private
LDAP injection
Bluejacking
33. Indicates when an account is no longer active.
Tailgate sensors
Account expiration
Boot
Backup frequency
34. Below 40% or above 50%
Smurf Attack
Spimming
Extreme Humidity
ICMP Flood
35. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
ACL (Access Control List)
Hoaxes
Zone transfer
Association request
36. Securing a restricted area by erecting a barrier is called ____.
Security
Fencing
Orphaned
Chain
37. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Challenge
SYN Flood
ACL (Access Control List)
Trusted OS
38. The most restrictive access control model is ____.
TACACS
Word Splitting
Shoulder Surfing
Mandatory Access Control
39. Due to the limitations of online guessing - most password attacks today use ____.
Content filtering
Offline cracking
Man-made Threat
Electronic Activist (hacktivist)
40. The weakness of passwords centers on ____.
Hoaxes
Human memory
Macro
Testing
41. Could become a key element in authentication in the future.
Fake Antivirus
Cognitive biometrics
Logic Bomb
Bluejacking
42. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Role
Rainbow Tables
Identification
Identity management
43. These accounts are user accounts that remain active after an employee has left an organization.
Social engineering
White box
Orphaned
Extreme Humidity
44. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Black Hat
Hybird
Spear Phishing
White Hat
45. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Bluesnarfing
Access Control
Symmetric encryption
Password
46. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Brute Force
Cyber Theft
ARP Poisoning
Role Based Access Control
47. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Vishing
Cracker
Authentication request
Content-Filtering Firewall
48. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Client_Hello
Stateless Firewall
Authentication request
Bluejacking
49. Four interrelated aspects to _________:Access - data - infrastructure - computers
Web security gateway
Dwell Time
Cognitive biometrics
Physical security
50. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Three-Way Handshake
CCTV
Hoaxes
Cyberbullying