SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ attacks are responsible for half of all malware delivered by Web advertising.
External Threat
Offline cracking
Fake Antivirus
Sniffer
2. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Firewalls
70
Firewall logs
Insiders
3. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Prevention and detection
Blacklisting Software
DLP
DNS
4. It accepts spoken words for input as if they had been typed on the keyboard.
Speech recognition
Stateful Firewall
Distributed storage
Backup scope
5. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Security
Hacker
Virtualization
Identity management
6. A secret combination of letters - numbers - and/or characters that only the user should know.
Bluejacking
Separation of duties
Rainbow Tables
Password
7. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Natural Threat
Rogue
Human memory
ACL (Access Control List)
8. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Flashing
RADIUS
Virtualization
Content filtering
9. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Insiders
Rainbow Tables
Bluesnarfing
Token
10. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Virtualization
DNS
Stateful packet filtering
CHAP (Challenge Handshake Authentication Protocol)
11. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
ACL (Access Control List)
Content inspection
Replay Attack
Cyber Theft
12. Requires mutual authentication used for WLAN encryption using Cisco client software.
Cracker
Virus
LEAP
Fake Antivirus
13. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Internal Threat
Clickjacking
Separation of duties
SSO
14. Computer crimes involving the theft of money
Subject
Tailgating
Client_Hello
Cyber Theft
15. A private key and public key
Prevention and detection
computer footprint
DNS Hijacking
What is asymmetic encryption?
16. Provides a greater degree of security by implementing port-based authentication.
Reverse proxy
Denial of service attack
Ciphertext
IEEE 802.1x
17. These accounts are user accounts that remain active after an employee has left an organization.
Flaming
Orphaned
Honeynet
TCP/IP
18. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
DNS poisoning
Electronic Activist (hacktivist)
Password Crackers
UDP Flood
19. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Roller barrier
White box
Swiss Cheese
Honeypot
20. A technique that allows private IP addresses to be used on the public Internet.
Virus
Mouse Trapping
Content filtering
NAT
21. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
ACL (Access Control List)
Insiders
Blacklisting Software
Character
22. A ____ is a network set up with intentional vulnerabilities.
Worm
SYN Flood
Mandatory Access Control
Honeynet
23. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Content filtering
computer footprint
Eavesdropping Attack
DNS Log
24. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
PAT
RADIUS
Data
25. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Cyberstalking/Harassment
Cyber Theft
computer footprint
Insiders
26. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Floor Guard
Fencing
Trojan-horse virus
Spear Phishing
27. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cyberbullying
Human memory
Cloud computing
WEP (Wired Equivalent Privacy)
28. A variety of threats such as viruses - worms - and Trojan horses
Encryption
Symmetric encryption
Malicious code
Cyberstalking/Harassment
29. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Insiders
Wireless security
Phishing
Proximity reader
30. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
DNS poisoning
BioMetric devices
Honeypot
Router
31. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Two factor security
Man-made Threat
Brute Force Attack
Password
32. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Orphaned
Loop Protection
UDP Flood
Rogue
33. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Stateless Firewall
CCTV
Cyberstalking/Harassment
Roller barrier
34. A firewall that can block designated types of traffic from entering a protected network.
CHAP (Challenge Handshake Authentication Protocol)
Content-Filtering Firewall
Eavesdropping Attack
War Driving
35. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Ciphertext
Packet tampering
Firewalls
Malicious Insiders
36. A set of permissions that are attached to an object.
Chain
Phishing
Tailgating
ACL
37. A ____ attack is similar to a passive man-in-the-middle attack.
Wireless security
Replay
SSO
Reverse proxy
38. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
Media for backups
Macro
Cybercriminals
39. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Macro
computer footprint
Character
Insiders
40. A group of piconets in which connections exist between different piconets is called a ____.
Open Port
Scatternet
Distributed
Physical security
41. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Biometrics
Macro
ACL (Access Control List)
Stateless Firewall
42. Related to the perception - thought process - and understanding of the user.
Replay
Cognitive biometrics
External Threat
Worm
43. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
EAP
Role Based Access Control
Flashing
Web security gateway
44. An authentication process that involves three steps.
Replay Attack
Shoulder Surfing
GIF Layering
Three-Way Handshake
45. Could become a key element in authentication in the future.
RADIUS
Cognitive biometrics
War Driving
WEP (Wired Equivalent Privacy)
46. Securing a restricted area by erecting a barrier is called ____.
Tailgate sensors
Account expiration
Fake Antivirus
Fencing
47. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Word Splitting
Spoofing
Stateless Firewall
IEEE 802.1x
48. When DNS servers exchange information among themselves it is known as a ____.
Role Based Access Control
Zone transfer
War Driving
Authorization
49. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Federated identity management
Cognitive biometrics
BioMetric devices
Geometric variance
50. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
LEAP
CardSpace
Hoaxes
Distributed Denial of Service (DDoS)