SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A user accessing a computer system must present credentials or ____ when logging on to the system.
DNS poisoning
Virus
Identification
Vishing
2. Pretending to be another person.
Cracker
Impersonation
Bluesnarfing
Brute Force Attack
3. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Proximity reader
Drive-by Download
Spimming
Rainbow Tables
4. Holds the promise of reducing the number of usernames and passwords that users must memorize.
TACACS
Cognitive biometrics
SSO
Spear Phishing
5. Can also capture transmissions that contain passwords.
DAC
Protocol analyzer
Brute Force
Man-made Threat
6. It is able to code and decode data
Extreme Humidity
Logic Bomb
Web security gateway
Symmetric encryption
7. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Ciphertext
CardSpace
Offline cracking
RADIUS
8. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Data
Adware
DAC
Speech recognition
9. A ____ encrypts all data that is transmitted between the remote device and the network.
Biometrics
VPN
Physical security access control measures
Trusted OS
10. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Federated identity management
Resident
Server-Side
PAT
11. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Boot
Cloud computing
Flashing
LDAP injection
12. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Cognitive biometrics
Denial of service attack
Client_Hello
Chain
13. The process of verifying that your backups actually work
Testing
Identification
DAC
Prevention and detection
14. Often used for managing user access to one or more systems.
Tailgate sensors
Rule Based Access Control
Symmetric encryption
Roller barrier
15. A set of permissions that are attached to an object.
ACL
Internal Threat
Web security gateway
History
16. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Loop Protection
UDP Flood
70
Three-Way Handshake
17. A ____ means that the application or service assigned to that port is listening for any instructions.
Tailgating
MPack
DNS Hijacking
Open Port
18. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
Router
Biometrics
Brute Force
19. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Standard biometrics
Dwell Time
Account expiration
DMS (Demilitarized Zone)
20. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Worm
BioMetric devices
Vishing
Hybird
21. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Digital Certificate
Backup scope
Eavesdropping Attack
DNS Log
22. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
ACL
Brute Force Attack
Rogue
Boot
23. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
UDP Flood
Virus
Packet tampering
Spimming
24. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
NAT
Prevention and detection
Blacklisting Software
Biometrics
25. A firewall that can block designated types of traffic from entering a protected network.
DNS Hijacking
Physical security
Root
Content-Filtering Firewall
26. Four interrelated aspects to _________:Access - data - infrastructure - computers
ICMP Flood
Buffer Overflow
Backup scope
Physical security
27. Below 70 degrees or above 75 degrees
Extreme temperatures
Boot
Hoaxes
Floor Guard
28. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Wireless VLANs
Brute Force
Information security
OAuth
29. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Cracker
LDAP injection
Token
Scatternet
30. Set of rules that allow or deny traffic
ACL (Access Control List)
Web security gateway
Evil Twin
Packet filtering
31. Computer crimes involving the theft of money
Token
Cognitive biometrics
Cyber Theft
Spyware
32. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Sniffer
Cyberbullying
Distributed Denial of Service (DDoS)
CardSpace
33. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Honeynet
Cyberbullying
Symmetric encryption
Mouse Trapping
34. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
TCP/IP
Account expiration
Swiss Cheese
Stateful packet filtering
35. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Data
Roller barrier
Worm
Physical security
36. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Firewalls
Social engineering
Smurf Attack
Denial of service attack
37. A ____ is a network set up with intentional vulnerabilities.
External Threat
Cipher locks
Content inspection
Honeynet
38. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
SYN Flood
Adware
Trusted OS
Biometrics
39. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Smurf Attack
Operation
Federated identity management
DLP
40. A ____ is designed to separate a nonsecured area from a secured area.
Cybercriminals
Testing
Cracker
Mantrap
41. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
SSO
Two factor security
Bluesnarfing
Rogue
42. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
DAP
DNS poisoning
Electronic Activist (hacktivist)
Reverse proxy
43. A group of piconets in which connections exist between different piconets is called a ____.
Port Scanner
Brute Force
Wireless security
Scatternet
44. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Phishing
Distributed storage
Brute Force
Load balancing
45. An AP that is set up by an attacker.
Hash encoding
BioMetric devices
CCTV
Evil Twin
46. An attacker slips through a secure area following a legitimate employee.
Firewall logs
Firewalls
Content filtering
Tailgating
47. Requires mutual authentication used for WLAN encryption using Cisco client software.
Drive-by Download
DMS (Demilitarized Zone)
computer footprint
LEAP
48. Scrambles information into an alternative form that requires a key or password to decrypt the information
Encryption
Phishing
DNS poisoning
Cyberterrorist
49. A method for confirming users' identities
Media for backups
Cyber Theft
Authentication
Session hijacking
50. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Cipher locks
White Hat
Bluejacking
Mouse Trapping