SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Physical security
Replicating
Cipher locks
Reverse proxy
2. Form of phishing that targets wealthy individuals.
GIF Layering
Web security gateway
War Driving
Whaling
3. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Internal Threat
Denial of service attack
Word Splitting
TACACS
4. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Electronic Activist (hacktivist)
VPN
Cyberterrorist
5. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Testing
Cipher locks
Roller barrier
Association request
6. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Stateful packet filtering
LDAP injection
RADIUS
Blacklisting Software
7. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Tailgate sensors
Bluejacking
Biometrics
Character
8. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Subject
Shoulder Surfing
Environmental Threat
ICMP Flood
9. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Cybercriminals
Shoulder Surfing
Man-made Threat
Trojan-horse virus
10. Sending high volumes of UDP requests to a target.
Distributed storage
Amart card
Private
UDP Flood
11. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Honeynet
Challenge
Dwell Time
Tailgate sensors
12. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
SYN Flood
Man-in-the-Middle Attack
Trusted OS
13. The action that is taken by the subject over the object is called a ____.
SSO
Spimming
Operation
Role Based Access Control
14. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Roller barrier
Adware
Worm
Drive-by Download
15. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Smurf Attack
Internal Threat
Clickjacking
Flaming
16. An AP that is set up by an attacker.
ACL
Blacklisting Software
Evil Twin
ICMP Flood
17. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Bluesnarfing
Flaming
Security
Information security
18. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cyberbullying
Wireless VLANs
Trusted OS
Cyberterrorist
19. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Honeypot
Floor Guard
Malicious code
LDAP injection
20. A user under Role Based Access Control can be assigned only one ____.
Bluejacking
Role
Man-made Threat
Backup frequency
21. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Port Scanner
Boot
Malicious Insiders
Brute Force Attack
22. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Testing
TACACS
BioMetric devices
23. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Man-made Threat
Floor Guard
Mouse Trapping
Stateful Firewall
24. Related to the perception - thought process - and understanding of the user.
Sniffer
Buffer Overflow
Cognitive biometrics
Electronic Vandal
25. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Port Scanner
Dumpster Diving
Rogue
CardSpace
26. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Spimming
White Hat
Distributed storage
DNS
27. How often you perform your backups (cost-benefit analysis of backing up)
Cybercriminals
Hardware Attack
Backup frequency
Loop Protection
28. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Chain
Trojan-horse virus
Mantrap
GIF Layering
29. A user accessing a computer system must present credentials or ____ when logging on to the system.
Tailgate sensors
Loop Protection
Reverse proxy
Identification
30. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
White Hat
Insiders
DNS poisoning
Electronic Activist (hacktivist)
31. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Protocol analyzer
Man-in-the-Middle Attack
ACL (Access Control List)
Separation of duties
32. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
UDP Flood
DNS Log
DAP
Drive-by Download
33. ____ involves horizontally separating words - although it is still readable by the human eye.
Hash encoding
Malicious Insiders
Floor Guard
Word Splitting
34. Due to the limitations of online guessing - most password attacks today use ____.
Offline cracking
War Driving
Server-Side
IEEE 802.1x
35. A ____ attack is similar to a passive man-in-the-middle attack.
Media for backups
Backup scope
Replay
Private
36. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Client_Hello
Authentication request
Mouse Trapping
Dwell Time
37. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
Reverse proxy
Distributed
Loop Protection
38. How many past backups you keep - what you did on your machine etc.
External Threat
History
Server-Side
UDP Flood
39. When organizations use software that filters content to prevent the transmission of unauthorized information
Loop Protection
Geometric variance
Macro
Content filtering
40. A threat that originates from outside the company. (ex. power failure.)
Federated identity management
DMS (Demilitarized Zone)
Open Port
External Threat
41. Can create entries in a log for all queries that are received.
History
DNS Hijacking
DNS Log
Environmental Threat
42. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Cyber Theft
Spimming
Cyberstalking/Harassment
Electronic Activist (hacktivist)
43. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Physical security
Rogue
Trusted OS
44. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
ARP Poisoning
Dumpster Diving
Standard biometrics
Dwell Time
45. ____ can be prewired for electrical power as well as wired network connections.
Trusted OS
Locking Cabinets
Identity management
Adware
46. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Internal Threat
Offline cracking
Hoaxes
Mantrap
47. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
DAP
Cipher locks
Packet tampering
Authentication
48. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Honeypot
Locking Cabinets
Buffer Overflow
Trusted OS
49. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Data
DNS poisoning
Proximity reader
War Driving
50. It accepts spoken words for input as if they had been typed on the keyboard.
Challenge
Speech recognition
Subject
NAT