SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that is automatically downloaded to your computer without your consent or even your knowledge.
LDAP injection
BioMetric devices
Drive-by Download
Human memory
2. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Separation of duties
Denial of service attack
Data
Authentication request
3. Web application attacks are considered ____ attacks.
Server-Side
Extreme temperatures
Rainbow Tables
Tailgate sensors
4. Often used for managing user access to one or more systems.
White box
Rule Based Access Control
Boot
Roller barrier
5. A security analysis of the transaction within its approved context.
Account expiration
Content inspection
Spimming
Malicious Insiders
6. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Kerberos
Mouse Trapping
Dumpster Diving
Proximity reader
7. Ensures that messages are not corrupt or tampered with
Content filtering
Drive-by Download
Backup scope
Hash encoding
8. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Router
Brute Force Attack
Firewall logs
Identity management
9. Allows a single access point to service different types of users.
Port Scanner
Dwell Time
Wireless VLANs
Replicating
10. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Geometric variance
Packet filtering
Worm
Brute Force
11. The process of giving someone permission to do or have something
Authorization
Wireless VLANs
Spear Phishing
UDP Flood
12. Floods a Web site with so many requests for service that it slows down or crashes the site
Biometrics
IEEE 802.1x
Identity Theft
Denial of service attack
13. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Cybercriminals
History
RADIUS
Locking Cabinets
14. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
White box
Cybercriminals
Dumpster Diving
Port Scanner
15. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
DNS Log
WEP (Wired Equivalent Privacy)
Identification
BioMetric devices
16. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Password Crackers
Script Kiddie
Bluesnarfing
Clickjacking
17. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Three-Way Handshake
Bluejacking
ACL (Access Control List)
Fake Antivirus
18. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Stateful packet filtering
Orphaned
Flaming
ARP Poisoning
19. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
NAT
Evil Twin
DMS (Demilitarized Zone)
Spyware
20. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Adware
Separation of duties
Bluejacking
Drive-by Download
21. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Macro
DNS poisoning
Data
VPN
22. Sifting through a company's garbage to find information to help break into their computers
Dumpster Diving
Tailgating
Bluesnarfing
Electronic Vandal
23. A form of filtering that blocks only sites specified as harmful.
Wireless security
Worm
Blacklisting Software
Environmental Threat
24. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Spimming
Federated identity management
Worm
Boot
25. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Social engineering
Port Scanner
Roller barrier
Association request
26. The weakness of passwords centers on ____.
Bluejacking
Challenge
Information security
Human memory
27. Form of phishing that targets wealthy individuals.
Orphaned
Reverse proxy
ACL
Whaling
28. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
Cybercriminals
Adware
Identity management
29. People very knowledgeable about computers who use their knowledge to invade other people's computers
What is asymmetic encryption?
Bluejacking
Hacker
Brute Force
30. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Swiss Cheese
Password Crackers
Cipher locks
Brute Force Attack
31. Pretending to be another person.
Impersonation
Bluesnarfing
Kerberos
Data
32. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Hoaxes
Amart card
Scatternet
33. Related to the perception - thought process - and understanding of the user.
GIF Layering
Cognitive biometrics
Insiders
ACL (Access Control List)
34. A ____ encrypts all data that is transmitted between the remote device and the network.
White Hat
VPN
Cyberterrorist
computer footprint
35. A technique for crashing by sending too much data to the buffer in a comuter's memory
Clickjacking
Distributed storage
Buffer Overflow
Scatternet
36. A method for confirming users' identities
TCP/IP
Authentication
ARP Poisoning
Access Control
37. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Fencing
Environmental Threat
Authorization
Human memory
38. ____ involves horizontally separating words - although it is still readable by the human eye.
Word Splitting
MPack
Identity management
Man-made Threat
39. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Brute Force
Cyberbullying
Worm
Hacker
40. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
Private
Information security
Symmetric encryption
41. Indicates when an account is no longer active.
Account expiration
Malicious Insiders
Electronic eavesdropping
Macro
42. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
TCP/IP
Packet tampering
Impersonation
43. An attacker motivated by the ideology to attack computer or infrastructure networks.
Spear Phishing
Cyberterrorist
SSO
Content filtering
44. An attacker slips through a secure area following a legitimate employee.
Tailgating
Boot
What is asymmetic encryption?
Distributed Denial of Service (DDoS)
45. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Rootkit
Subject
Authentication request
Replay
46. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
DAP
Proximity reader
Phishing
Flashing
47. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Distributed storage
Encryption
Spear Phishing
Mouse Trapping
48. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Packet filtering
Mouse Trapping
Authentication
Separation of duties
49. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
GIF Layering
Cyberterrorist
Resident
Hybird
50. Sending high volumes of UDP requests to a target.
Two factor security
Standard biometrics
UDP Flood
Password Crackers