SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ensures that messages are not corrupt or tampered with
Honeypot
Hash encoding
Identity management
ACL (Access Control List)
2. Web application attacks are considered ____ attacks.
Server-Side
SYN Flood
Association request
External Threat
3. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Content-Filtering Firewall
Spoofing
Bluesnarfing
Association request
4. A ____ is designed to separate a nonsecured area from a secured area.
Cyberterrorist
Session hijacking
Authorization
Mantrap
5. The weakness of passwords centers on ____.
Human memory
Operation
Rainbow Tables
Backup scope
6. Lock - conduit - card key - video equipment - secured guard
ICMP Flood
Physical security access control measures
Server-Side
Mantrap
7. Password and BioMetric
Security
Two factor security
Physical security
Electronic eavesdropping
8. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Hybird
Floor Guard
Role Based Access Control
ACL (Access Control List)
9. Fingerprints and patterns
Flashing
Authentication request
Wireless VLANs
BioMetric devices
10. A private key and public key
Bluesnarfing
What is asymmetic encryption?
Fake Antivirus
Replicating
11. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Information security
Content filtering
Vishing
Cybercriminals
12. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Content filtering
Cyberterrorist
Fake Antivirus
Bluesnarfing
13. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Physical security
TCP/IP
Malicious code
Whaling
14. An AP that is set up by an attacker.
Evil Twin
Stateless Firewall
Encryption
Chain
15. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Cyber Theft
Spoofing
Content-Filtering Firewall
Sniffer
16. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Cognitive biometrics
Spyware
Adware
Session hijacking
17. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Bluesnarfing
DAP
Resident
Spoofing
18. Computer crimes involving the theft of money
Cyber Theft
Mantrap
Load balancing
CCTV
19. How many past backups you keep - what you did on your machine etc.
DAP
Amart card
History
IEEE 802.1x
20. How often you perform your backups (cost-benefit analysis of backing up)
Backup frequency
Electronic Activist (hacktivist)
Stateful packet filtering
Private
21. A technology that can help to evenly distribute work across a network.
SYN Flood
DNS
Cybercriminals
Load balancing
22. A ____ virus infects the Master Boot Record of a hard disk drive.
Content filtering
ICMP Flood
Boot
Orphaned
23. Forwards packets across computer networks.
Fencing
White box
DAC
Router
24. Requires mutual authentication used for WLAN encryption using Cisco client software.
Orphaned
Swiss Cheese
LEAP
Fake Antivirus
25. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
WEP (Wired Equivalent Privacy)
Black Hat
Natural Threat
Ciphertext
26. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Spyware
Content filtering
Mouse Trapping
Identity Theft
27. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Cipher locks
DAP
Trusted OS
Hardware Attack
28. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
CCTV
DNS poisoning
Federated identity management
29. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Fencing
TACACS
Spear Phishing
White Hat
30. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Man-made Threat
Sniffer
White box
Port Scanner
31. The process of giving someone permission to do or have something
Authorization
External Threat
Rogue
Private
32. Often used for managing user access to one or more systems.
Subject
OAuth
Rule Based Access Control
DMS (Demilitarized Zone)
33. A method for confirming users' identities
Authentication
Geometric variance
Cracker
Offline cracking
34. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Digital Certificate
WEP (Wired Equivalent Privacy)
DNS Hijacking
PAT
35. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Hoaxes
Malicious Insiders
Social engineering
Floor Guard
36. Below 70 degrees or above 75 degrees
Scatternet
DMS (Demilitarized Zone)
Extreme temperatures
Challenge
37. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
TACACS
Cracker
Proximity reader
Smurf Attack
38. A user under Role Based Access Control can be assigned only one ____.
Resident
Role
Content filtering
Role Based Access Control
39. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Spoofing
SSO
Word Splitting
DMS (Demilitarized Zone)
40. A variety of threats such as viruses - worms - and Trojan horses
Cloud computing
Malicious code
Identity management
Roller barrier
41. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Flaming
Macro
Rule Based Access Control
Geometric variance
42. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Worm
Logic Bomb
Whaling
43. A security analysis of the transaction within its approved context.
Trojan-horse virus
DNS Hijacking
Content inspection
OAuth
44. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Subject
TCP/IP
TACACS
Boot
45. Set of rules that allow or deny traffic
Hoaxes
DNS Log
Scatternet
Packet filtering
46. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Identity management
Web security gateway
Authentication
Cipher locks
47. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Packet tampering
DNS poisoning
Replicating
Reverse proxy
48. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
NAT
Cognitive biometrics
Spear Phishing
Internal Threat
49. Pretending to be another person.
Bluesnarfing
Impersonation
Buffer Overflow
Challenge
50. A form of filtering that blocks only sites specified as harmful.
Role Based Access Control
Evil Twin
Server-Side
Blacklisting Software
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests