SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Challenge
Content-Filtering Firewall
Federated identity management
Bluejacking
2. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
DNS
Cracker
Replay
Encryption
3. Sending high volumes of ICMP (usually ping) packets to a target.
Wireless VLANs
Security
Impersonation
ICMP Flood
4. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
What is asymmetic encryption?
Brute Force Attack
CardSpace
Spyware
5. It accepts spoken words for input as if they had been typed on the keyboard.
Man-made Threat
Speech recognition
Roller barrier
Malicious Insiders
6. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Evil Twin
Spimming
Challenge
Internal Threat
7. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Information security
Virtualization
Kerberos
Cybercriminals
8. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Rogue
Electronic eavesdropping
Black Hat
Script Kiddie
9. An authentication process that involves three steps.
Smurf Attack
Three-Way Handshake
Sniffer
Stateful Firewall
10. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Bluejacking
GIF Layering
Load balancing
Electronic Activist (hacktivist)
11. ____ can be prewired for electrical power as well as wired network connections.
Eavesdropping Attack
LDAP injection
Locking Cabinets
Evil Twin
12. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Rootkit
Worm
Extreme Humidity
13. An attacker motivated by the ideology to attack computer or infrastructure networks.
Cyberterrorist
Mandatory Access Control
Root
Association request
14. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Cloud computing
DNS poisoning
Malicious code
15. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
Macro
Sniffer
Hybird
16. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Wireless VLANs
War Driving
Spyware
Cyberstalking/Harassment
17. People very knowledgeable about computers who use their knowledge to invade other people's computers
History
Hacker
Social engineering
Electronic eavesdropping
18. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Hardware Attack
Electronic Activist (hacktivist)
Bluejacking
Locking Cabinets
19. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Role
Logic Bomb
Stateful packet filtering
Port Scanner
20. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Media for backups
Worm
Operation
DMS (Demilitarized Zone)
21. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Standard biometrics
Digital Certificate
Man-made Threat
Mandatory Access Control
22. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Hash encoding
Bluejacking
Vishing
Malicious Insiders
23. A technique that allows private IP addresses to be used on the public Internet.
Client_Hello
ACL
Environmental Threat
NAT
24. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Cyberstalking/Harassment
Authorization
Trojan-horse virus
Floor Guard
25. A ____ means that the application or service assigned to that port is listening for any instructions.
DNS
Virtualization
Open Port
EAP
26. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Speech recognition
RADIUS
Private
Wireless VLANs
27. A ____ attack is similar to a passive man-in-the-middle attack.
Replay
Token
BioMetric devices
Phishing
28. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
White box
Cyberbullying
Speech recognition
Identity Theft
29. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Extreme Humidity
Insiders
Speech recognition
Cyberbullying
30. A firewall that can block designated types of traffic from entering a protected network.
Bluesnarfing
Content-Filtering Firewall
Locking Cabinets
Association request
31. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Access Control
Client_Hello
OAuth
History
32. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Cyberstalking/Harassment
Bluesnarfing
WEP (Wired Equivalent Privacy)
Honeypot
33. Securing a restricted area by erecting a barrier is called ____.
Mandatory Access Control
Fencing
Replay
Evil Twin
34. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Role
Flashing
NAT
35. Can also capture transmissions that contain passwords.
Backup frequency
Operation
Protocol analyzer
Electronic Activist (hacktivist)
36. A technology that can help to evenly distribute work across a network.
Boot
Data
Load balancing
ACL (Access Control List)
37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Rogue
Electronic Activist (hacktivist)
Vishing
Backup frequency
38. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DAP
Protocol analyzer
Bluejacking
Port Scanner
39. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Spimming
Authentication
Subject
TCP/IP
40. A form of filtering that blocks only sites specified as harmful.
Media for backups
Macro
Blacklisting Software
TACACS
41. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
White Hat
computer footprint
Cyberstalking/Harassment
Identification
42. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
EAP
Challenge
Extreme Humidity
Speech recognition
43. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Rootkit
Physical security access control measures
Script Kiddie
Virtualization
44. These accounts are user accounts that remain active after an employee has left an organization.
Bluejacking
Man-in-the-Middle Attack
What is asymmetic encryption?
Orphaned
45. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Client_Hello
Phishing
Man-made Threat
Biometrics
46. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Cloud computing
Geometric variance
Script Kiddie
Client_Hello
47. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Scatternet
DAP
Rule Based Access Control
Spoofing
48. Viruses and worms are said to be self-____.
Replicating
Backup scope
Role Based Access Control
Physical security
49. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Script Kiddie
VPN
Backup frequency
Role Based Access Control
50. A secret combination of letters - numbers - and/or characters that only the user should know.
Extreme Humidity
Firewalls
Password
Information security