SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Honeypot
ACL (Access Control List)
Phishing
White box
2. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Buffer Overflow
Physical security access control measures
Electronic eavesdropping
Reverse proxy
3. ____ attacks are responsible for half of all malware delivered by Web advertising.
Bluesnarfing
Fake Antivirus
UDP Flood
Identification
4. An AP that is set up by an attacker.
Information security
Man-in-the-Middle Attack
Evil Twin
Smurf Attack
5. The ____ model is the least restrictive.
Macro
DAC
Stateful Firewall
Password Crackers
6. Indicates when an account is no longer active.
Role
Account expiration
Fake Antivirus
Bluesnarfing
7. These attacks may allow an attacker to construct LDAP statements based on user input statements.
LDAP injection
CardSpace
Stateless Firewall
Rogue
8. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Sniffer
Worm
ICMP Flood
Authentication
9. A secret combination of letters - numbers - and/or characters that only the user should know.
Password
Rainbow Tables
Bluejacking
Character
10. A firewall that can block designated types of traffic from entering a protected network.
Content-Filtering Firewall
Rule Based Access Control
VPN
Open Port
11. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Physical security access control measures
Orphaned
Buffer Overflow
Malicious Insiders
12. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Extreme Humidity
DLP
White box
Electronic eavesdropping
13. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Encryption
Resident
Flaming
Content inspection
14. Floods a Web site with so many requests for service that it slows down or crashes the site
Identity Theft
Offline cracking
Electronic Vandal
Denial of service attack
15. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Extreme temperatures
Digital Certificate
BioMetric devices
Federated identity management
16. A form of filtering that blocks only sites specified as harmful.
Man-made Threat
Trojan-horse virus
Prevention and detection
Blacklisting Software
17. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Whaling
Bluesnarfing
Natural Threat
Cyberbullying
18. ____ is an image spam that is divided into multiple images.
GIF Layering
Adware
Locking Cabinets
Buffer Overflow
19. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Media for backups
Cloud computing
Role
DLP
20. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
ACL (Access Control List)
Protocol analyzer
Electronic Activist (hacktivist)
Identity Theft
21. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Blacklisting Software
Roller barrier
Swiss Cheese
Operation
22. People very knowledgeable about computers who use their knowledge to invade other people's computers
Stateful Firewall
Hacker
Port Scanner
Packet filtering
23. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Electronic eavesdropping
Ciphertext
Hybird
Cybercriminals
24. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DAP
Honeypot
Social engineering
Human memory
25. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Electronic Vandal
Bluejacking
ARP Poisoning
Cloud computing
26. A set of permissions that are attached to an object.
Amart card
Stateful packet filtering
CCTV
ACL
27. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Locking Cabinets
Virus
ICMP Flood
Rootkit
28. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Cyber Theft
Three-Way Handshake
Amart card
Bluesnarfing
29. A technique that allows private IP addresses to be used on the public Internet.
Virtualization
NAT
Digital Certificate
Client_Hello
30. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Chain
Dumpster Diving
Cloud computing
Physical security access control measures
31. Set of rules that allow or deny traffic
What is asymmetic encryption?
Packet filtering
Hybird
Two factor security
32. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Symmetric encryption
Wireless VLANs
Trusted OS
Rainbow Tables
33. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Cyber Theft
Authentication
TCP/IP
34. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Separation of duties
Cyberstalking/Harassment
Ciphertext
Physical security
35. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Data
Flashing
Wireless VLANs
Distributed Denial of Service (DDoS)
36. A means of managing and presenting computer resources by function without regard to their physical layout or location.
SSO
Rogue
Replay Attack
Virtualization
37. How many past backups you keep - what you did on your machine etc.
computer footprint
History
Boot
Separation of duties
38. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Environmental Threat
Router
Cyberstalking/Harassment
Geometric variance
39. An authentication process that involves three steps.
Script Kiddie
Three-Way Handshake
Cyberstalking/Harassment
Virus
40. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Cyberbullying
Cyberstalking/Harassment
Password Crackers
41. The most restrictive access control model is ____.
Evil Twin
Mandatory Access Control
Worm
Spear Phishing
42. Four interrelated aspects to _________:Access - data - infrastructure - computers
PAT
Fake Antivirus
Physical security
Firewall logs
43. Ensures that messages are not corrupt or tampered with
TACACS
Root
Hash encoding
Chain
44. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Loop Protection
Security
Replicating
Honeypot
45. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Spear Phishing
Hacker
White box
Hardware Attack
46. Content filtering - encryption - firewalls
SSO
Digital Certificate
Prevention and detection
Worm
47. Using a single authentication credential that is shared across multiple networks.
MPack
Replay
OAuth
Identity management
48. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
OAuth
computer footprint
Trusted OS
ICMP Flood
49. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Load balancing
LDAP injection
Character
Adware
50. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
Session hijacking
Drive-by Download
CardSpace