SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Insiders
Subject
Virus
DNS
2. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Virtualization
Mantrap
Trusted OS
Client_Hello
3. A technique for crashing by sending too much data to the buffer in a comuter's memory
Cognitive biometrics
Security
Media for backups
Buffer Overflow
4. A form of filtering that blocks only sites specified as harmful.
Rule Based Access Control
Blacklisting Software
Cyber Theft
White Hat
5. Using a single authentication credential that is shared across multiple networks.
Identity management
Stateful packet filtering
70
Floor Guard
6. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
History
Hoaxes
White box
ARP Poisoning
7. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Backup frequency
Sniffer
External Threat
Phishing
8. A technique that allows private IP addresses to be used on the public Internet.
VPN
70
Macro
NAT
9. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Clickjacking
Swiss Cheese
War Driving
White box
10. These accounts are user accounts that remain active after an employee has left an organization.
Rogue
Hash encoding
UDP Flood
Orphaned
11. Form of phishing that targets wealthy individuals.
Fake Antivirus
Proximity reader
Whaling
Virus
12. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Resident
Replay Attack
Roller barrier
Authentication request
13. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Standard biometrics
Mantrap
Electronic Vandal
Content inspection
14. Related to the perception - thought process - and understanding of the user.
Swiss Cheese
Protocol analyzer
Adware
Cognitive biometrics
15. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Firewalls
Shoulder Surfing
Cloud computing
Authentication
16. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Bluejacking
Data
Identity Theft
Proximity reader
17. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Proximity reader
Flashing
ACL (Access Control List)
Character
18. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Distributed
Content inspection
OAuth
Symmetric encryption
19. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Spoofing
Distributed storage
Rootkit
70
20. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Password Crackers
Hardware Attack
Impersonation
Server-Side
21. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Open Port
TCP/IP
Hoaxes
Speech recognition
22. An authentication process that involves three steps.
IEEE 802.1x
External Threat
Bluejacking
Three-Way Handshake
23. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Dwell Time
Web security gateway
DLP
Human memory
24. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Authentication request
Locking Cabinets
Floor Guard
Session hijacking
25. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Identification
Bluesnarfing
Geometric variance
Authentication
26. A user under Role Based Access Control can be assigned only one ____.
Role
War Driving
Cyberbullying
Virtualization
27. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Rootkit
Subject
LDAP injection
Cognitive biometrics
28. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Script Kiddie
Spear Phishing
Honeypot
Denial of service attack
29. Below 70 degrees or above 75 degrees
TACACS
Extreme temperatures
Operation
Insiders
30. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
DNS Hijacking
Vishing
Dwell Time
Smurf Attack
31. How secure the data in your backups is-can use physical security or encryption
GIF Layering
DMS (Demilitarized Zone)
Security
DNS Log
32. It accepts spoken words for input as if they had been typed on the keyboard.
Reverse proxy
LDAP injection
Speech recognition
RADIUS
33. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
SYN Flood
Client_Hello
Worm
Flaming
34. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
LEAP
Distributed Denial of Service (DDoS)
Offline cracking
MPack
35. Pretending to be another person.
Impersonation
Content filtering
Clickjacking
Natural Threat
36. A framework for transporting authentication protocols instead of the authentication protocol itself.
Information security
EAP
ACL
Trusted OS
37. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
White box
Operation
Authorization
Role Based Access Control
38. People very knowledgeable about computers who use their knowledge to invade other people's computers
Black Hat
Hacker
Ciphertext
Spimming
39. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Hybird
Identity Theft
Geometric variance
Electronic eavesdropping
40. Allows a single access point to service different types of users.
Flashing
Wireless VLANs
Denial of service attack
Stateless Firewall
41. Scrambles information into an alternative form that requires a key or password to decrypt the information
Role Based Access Control
Encryption
Cracker
Challenge
42. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Physical security
Stateless Firewall
Replay Attack
NAT
43. Can create entries in a log for all queries that are received.
Firewalls
DNS Log
Content-Filtering Firewall
What is asymmetic encryption?
44. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluejacking
Spoofing
Man-made Threat
Bluesnarfing
45. It is able to code and decode data
Resident
Mandatory Access Control
Symmetric encryption
Packet tampering
46. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Media for backups
Stateful packet filtering
Biometrics
Private
47. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Identity management
History
Cipher locks
48. Ensures that messages are not corrupt or tampered with
White box
Physical security
Hash encoding
Authentication request
49. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
MPack
ACL (Access Control List)
DNS poisoning
Brute Force Attack
50. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Eavesdropping Attack
Private
Zone transfer