SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows a single access point to service different types of users.
Firewall logs
Digital Certificate
Wireless VLANs
Biometrics
2. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Mouse Trapping
Separation of duties
Physical security access control measures
3. Requires mutual authentication used for WLAN encryption using Cisco client software.
Prevention and detection
LEAP
IEEE 802.1x
Black Hat
4. Sending high volumes of ICMP (usually ping) packets to a target.
Speech recognition
Ciphertext
Packet tampering
ICMP Flood
5. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Malicious Insiders
Standard biometrics
Social engineering
Wireless security
6. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Spimming
Phishing
Boot
Geometric variance
7. The time it takes for a key to be pressed and then released.
DNS Log
Dwell Time
Internal Threat
Password
8. Using a single authentication credential that is shared across multiple networks.
Spimming
Hardware Attack
Replay Attack
Identity management
9. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Hybird
ACL (Access Control List)
Rule Based Access Control
Virus
10. A technique that allows private IP addresses to be used on the public Internet.
Password Crackers
Extreme temperatures
NAT
Flashing
11. A ____ does not serve clients - but instead routes incoming requests to the correct server.
ICMP Flood
Token
Reverse proxy
Cognitive biometrics
12. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Brute Force Attack
Proximity reader
Flaming
Role Based Access Control
13. Small electronic devices that change user passwords automatically
Token
War Driving
Spoofing
ARP Poisoning
14. Related to the perception - thought process - and understanding of the user.
ACL (Access Control List)
EAP
PAT
Cognitive biometrics
15. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Hardware Attack
Trojan-horse virus
Role Based Access Control
Smurf Attack
16. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Resident
Environmental Threat
Distributed
Word Splitting
17. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Two factor security
Private
ICMP Flood
Trusted OS
18. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Man-made Threat
Internal Threat
Resident
Buffer Overflow
19. Floods a Web site with so many requests for service that it slows down or crashes the site
Distributed storage
Denial of service attack
Honeynet
Internal Threat
20. How many past backups you keep - what you did on your machine etc.
Environmental Threat
History
Subject
70
21. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Distributed storage
Backup scope
Flashing
CCTV
22. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
What is asymmetic encryption?
Three-Way Handshake
Cipher locks
CCTV
23. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Cyberbullying
Identification
Electronic Activist (hacktivist)
Wireless security
24. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Spyware
Spimming
Trusted OS
ARP Poisoning
25. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Spoofing
Association request
SSO
Security
26. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Hardware Attack
OAuth
Ciphertext
Social engineering
27. The ____ model is the least restrictive.
UDP Flood
DAC
Extreme temperatures
Content-Filtering Firewall
28. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Electronic Activist (hacktivist)
Spyware
Client_Hello
Offline cracking
29. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Malicious Insiders
Association request
Packet tampering
30. Fingerprints and patterns
Authentication
Three-Way Handshake
Chain
BioMetric devices
31. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
ACL
ARP Poisoning
Impersonation
CHAP (Challenge Handshake Authentication Protocol)
32. Can also capture transmissions that contain passwords.
Locking Cabinets
Protocol analyzer
Account expiration
Offline cracking
33. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Denial of service attack
Content filtering
Two factor security
34. When organizations use software that filters content to prevent the transmission of unauthorized information
Zone transfer
Content filtering
Hoaxes
GIF Layering
35. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
SSO
Biometrics
Data
CardSpace
36. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Cracker
Token
Floor Guard
Spoofing
37. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Access Control
Password
Malicious code
Impersonation
38. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Bluesnarfing
Adware
Cloud computing
Virus
39. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Loop Protection
Hardware Attack
Hoaxes
Hacker
40. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Virus
Content-Filtering Firewall
ACL
WEP (Wired Equivalent Privacy)
41. A private key and public key
CHAP (Challenge Handshake Authentication Protocol)
What is asymmetic encryption?
DMS (Demilitarized Zone)
Challenge
42. A threat that originates from outside the company. (ex. power failure.)
External Threat
DNS poisoning
Sniffer
ARP Poisoning
43. How secure the data in your backups is-can use physical security or encryption
Security
OAuth
Firewall logs
Open Port
44. Can be used to determine whether new IP addresses are attempting to probe the network.
Content-Filtering Firewall
Firewall logs
Cyberbullying
Cognitive biometrics
45. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Hash encoding
Fencing
Honeynet
Brute Force Attack
46. A secret combination of letters - numbers - and/or characters that only the user should know.
Authentication request
DLP
Environmental Threat
Password
47. A technique for crashing by sending too much data to the buffer in a comuter's memory
Buffer Overflow
Tailgate sensors
Wireless VLANs
Wireless security
48. An attacker slips through a secure area following a legitimate employee.
Tailgating
Macro
UDP Flood
DLP
49. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
Buffer Overflow
UDP Flood
Bluesnarfing
50. A form of filtering that blocks only sites specified as harmful.
Virtualization
WEP (Wired Equivalent Privacy)
Blacklisting Software
Extreme Humidity