SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A set of permissions that are attached to an object.
What is asymmetic encryption?
Password
ACL
Locking Cabinets
2. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
SSO
Three-Way Handshake
Adware
Boot
3. When DNS servers exchange information among themselves it is known as a ____.
Zone transfer
Electronic Vandal
Role
computer footprint
4. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Bluejacking
Replay Attack
Web security gateway
Password Crackers
5. A commonly used technique by pornography sites where a user gets "locked" in a web site.
DAP
Honeynet
Mouse Trapping
Client_Hello
6. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Resident
Scatternet
Router
Reverse proxy
7. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Identity Theft
Subject
Hacker
Data
8. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Insiders
Hoaxes
Rogue
Scatternet
9. These attacks may allow an attacker to construct LDAP statements based on user input statements.
LDAP injection
GIF Layering
Subject
Honeypot
10. ____ is an image spam that is divided into multiple images.
Cognitive biometrics
Extreme Humidity
GIF Layering
Cracker
11. Viruses and worms are said to be self-____.
Replicating
Cyberterrorist
DAP
Rogue
12. Password and BioMetric
Honeynet
EAP
Fencing
Two factor security
13. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Rootkit
Script Kiddie
Router
Brute Force
14. A ____ virus infects the Master Boot Record of a hard disk drive.
Stateless Firewall
Boot
Bluejacking
IEEE 802.1x
15. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Cognitive biometrics
DAP
Authentication request
ICMP Flood
16. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Password Crackers
Spimming
Flaming
Backup frequency
17. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
White box
Standard biometrics
Social engineering
DNS poisoning
18. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Fake Antivirus
Rootkit
OAuth
White box
19. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Kerberos
Subject
Replay
Client_Hello
20. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Drive-by Download
Roller barrier
War Driving
Flaming
21. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Malicious Insiders
Cracker
Social engineering
DNS Log
22. A threat that originates from outside the company. (ex. power failure.)
Social engineering
Distributed Denial of Service (DDoS)
External Threat
Electronic Vandal
23. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Mantrap
Identification
Three-Way Handshake
Standard biometrics
24. Sending high volumes of ICMP (usually ping) packets to a target.
ICMP Flood
Cyberbullying
Flaming
Proximity reader
25. A ____ encrypts all data that is transmitted between the remote device and the network.
DMS (Demilitarized Zone)
Virtualization
VPN
Tailgating
26. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
DNS poisoning
Hoaxes
DAC
Honeynet
27. Wants to cause as much damage as possible - without a particular target or goal.
Private
Electronic Vandal
LDAP injection
Authentication request
28. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
WEP (Wired Equivalent Privacy)
DNS Hijacking
Bluejacking
Vishing
29. The most restrictive access control model is ____.
ICMP Flood
Mandatory Access Control
Malicious Insiders
Firewalls
30. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Distributed storage
Security
Authentication
Backup frequency
31. ____ attacks are responsible for half of all malware delivered by Web advertising.
Server-Side
Fake Antivirus
CCTV
Session hijacking
32. People very knowledgeable about computers who use their knowledge to invade other people's computers
Stateful Firewall
Subject
External Threat
Hacker
33. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
WEP (Wired Equivalent Privacy)
Electronic Vandal
Replay
Resident
34. Related to the perception - thought process - and understanding of the user.
Character
Rootkit
Scatternet
Cognitive biometrics
35. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Firewalls
White Hat
ACL
Loop Protection
36. Fingerprints and patterns
Worm
Amart card
BioMetric devices
Separation of duties
37. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Biometrics
Brute Force
Adware
Smurf Attack
38. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Media for backups
Sniffer
Brute Force Attack
SYN Flood
39. A technique for crashing by sending too much data to the buffer in a comuter's memory
Testing
Authentication
Identity management
Buffer Overflow
40. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Eavesdropping Attack
Bluesnarfing
Digital Certificate
Flaming
41. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Denial of service attack
Offline cracking
Spyware
Man-in-the-Middle Attack
42. Set of rules that allow or deny traffic
LDAP injection
Hash encoding
Cyberterrorist
Packet filtering
43. Pretending to be another person.
Standard biometrics
White Hat
Swiss Cheese
Impersonation
44. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Identity management
Role
Environmental Threat
Private
45. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Cybercriminals
Offline cracking
Man-in-the-Middle Attack
Bluesnarfing
46. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
TCP/IP
Cybercriminals
Operation
Electronic eavesdropping
47. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Roller barrier
Reverse proxy
Replay
48. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Protocol analyzer
Access Control
DNS Hijacking
Roller barrier
49. Requires mutual authentication used for WLAN encryption using Cisco client software.
IEEE 802.1x
LEAP
Security
Hybird
50. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Password Crackers
Virus
Evil Twin