SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. It is able to code and decode data
Symmetric encryption
OAuth
EAP
Insiders
2. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Information security
Zone transfer
ARP Poisoning
Electronic Vandal
3. An AP that is set up by an attacker.
Physical security
Identification
Evil Twin
Role Based Access Control
4. Below 40% or above 50%
Replay Attack
CHAP (Challenge Handshake Authentication Protocol)
LEAP
Extreme Humidity
5. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
DNS poisoning
Proximity reader
Brute Force
ACL (Access Control List)
6. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Load balancing
Wireless security
Extreme Humidity
Replay Attack
7. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
VPN
Extreme temperatures
Distributed storage
Stateful packet filtering
8. The most restrictive access control model is ____.
Mandatory Access Control
Malicious Insiders
Session hijacking
Roller barrier
9. When organizations use software that filters content to prevent the transmission of unauthorized information
Authorization
Content filtering
Standard biometrics
Evil Twin
10. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Cybercriminals
Port Scanner
Cipher locks
Bluejacking
11. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Blacklisting Software
Identification
DNS Hijacking
Brute Force Attack
12. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Stateful packet filtering
Proximity reader
DNS Log
Cracker
13. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
TCP/IP
Human memory
Access Control
Session hijacking
14. The process of verifying that your backups actually work
Physical security access control measures
Brute Force
GIF Layering
Testing
15. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Content filtering
Hardware Attack
Session hijacking
Web security gateway
16. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Electronic Vandal
Flashing
Firewalls
Roller barrier
17. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Operation
Bluejacking
Replay Attack
Standard biometrics
18. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Tailgating
Subject
Federated identity management
19. Provides a greater degree of security by implementing port-based authentication.
DNS Hijacking
Electronic Activist (hacktivist)
Separation of duties
IEEE 802.1x
20. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Distributed Denial of Service (DDoS)
Open Port
Digital Certificate
Bluejacking
21. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
ACL (Access Control List)
Firewalls
Adware
22. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Swiss Cheese
ACL
Symmetric encryption
Hybird
23. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Black Hat
Clickjacking
Virus
24. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Buffer Overflow
ACL (Access Control List)
Authentication request
DNS
25. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
War Driving
Kerberos
Shoulder Surfing
Mouse Trapping
26. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
DMS (Demilitarized Zone)
Flashing
Three-Way Handshake
Electronic Activist (hacktivist)
27. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Wireless security
Reverse proxy
VPN
Cognitive biometrics
28. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Cloud computing
Packet tampering
Backup scope
Swiss Cheese
29. Form of phishing that targets wealthy individuals.
DMS (Demilitarized Zone)
Whaling
Flashing
Digital Certificate
30. A user under Role Based Access Control can be assigned only one ____.
Extreme Humidity
ACL (Access Control List)
Role
Root
31. Small electronic devices that change user passwords automatically
Worm
Token
Session hijacking
Stateful Firewall
32. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
CHAP (Challenge Handshake Authentication Protocol)
Cognitive biometrics
Drive-by Download
Boot
33. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Whaling
Cyberstalking/Harassment
Proximity reader
34. Four interrelated aspects to _________:Access - data - infrastructure - computers
Extreme Humidity
CHAP (Challenge Handshake Authentication Protocol)
Roller barrier
Physical security
35. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Hoaxes
Server-Side
Data
Distributed storage
36. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
MPack
ARP Poisoning
GIF Layering
LEAP
37. Users who access a Web server are usually restricted to the ____ directory.
Kerberos
Brute Force Attack
White Hat
Root
38. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
Mouse Trapping
Scatternet
IEEE 802.1x
39. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Rootkit
Stateless Firewall
Script Kiddie
Clickjacking
40. Requires mutual authentication used for WLAN encryption using Cisco client software.
Biometrics
Tailgate sensors
LEAP
Stateful packet filtering
41. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
PAT
Cracker
Man-in-the-Middle Attack
Separation of duties
42. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Load balancing
Backup scope
Man-in-the-Middle Attack
Identity Theft
43. Indicates when an account is no longer active.
Honeynet
History
Account expiration
Dwell Time
44. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
Proximity reader
Electronic eavesdropping
Prevention and detection
45. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Blacklisting Software
Rainbow Tables
Rogue
Hybird
46. Related to the perception - thought process - and understanding of the user.
Media for backups
IEEE 802.1x
Hash encoding
Cognitive biometrics
47. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
RADIUS
Bluejacking
Flaming
48. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Sniffer
Digital Certificate
Proximity reader
Brute Force Attack
49. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
NAT
Two factor security
Denial of service attack
DNS
50. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Smurf Attack
CardSpace
Symmetric encryption
Cloud computing
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests