SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Client_Hello
LDAP injection
IEEE 802.1x
Wireless VLANs
2. A ____ encrypts all data that is transmitted between the remote device and the network.
VPN
NAT
Role
Zone transfer
3. Floods a Web site with so many requests for service that it slows down or crashes the site
Social engineering
Hash encoding
Denial of service attack
Rainbow Tables
4. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Boot
Wireless security
Trojan-horse virus
DNS
5. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
Wireless security
Wireless VLANs
Hardware Attack
6. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Port Scanner
Adware
DMS (Demilitarized Zone)
Character
7. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Content inspection
Virus
Dumpster Diving
Cyberbullying
8. How many past backups you keep - what you did on your machine etc.
History
Symmetric encryption
Stateless Firewall
Extreme Humidity
9. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
LEAP
Roller barrier
Fake Antivirus
Distributed
10. A user under Role Based Access Control can be assigned only one ____.
SSO
VPN
Roller barrier
Role
11. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Encryption
Two factor security
Open Port
Geometric variance
12. Computer crimes involving the theft of money
Access Control
OAuth
Cyber Theft
Natural Threat
13. Provides a greater degree of security by implementing port-based authentication.
DLP
IEEE 802.1x
Character
Physical security
14. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Protocol analyzer
Spimming
Character
Worm
15. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Electronic Activist (hacktivist)
Phishing
Encryption
Information security
16. When organizations use software that filters content to prevent the transmission of unauthorized information
Hacker
Content filtering
Malicious Insiders
DMS (Demilitarized Zone)
17. The most restrictive access control model is ____.
Hash encoding
Mandatory Access Control
Stateful Firewall
Cloud computing
18. A method for confirming users' identities
Password
Bluejacking
Authentication
Word Splitting
19. It accepts spoken words for input as if they had been typed on the keyboard.
Speech recognition
Biometrics
Firewall logs
Mandatory Access Control
20. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Denial of service attack
Two factor security
Social engineering
CHAP (Challenge Handshake Authentication Protocol)
21. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Client_Hello
External Threat
Flaming
Ciphertext
22. Users who access a Web server are usually restricted to the ____ directory.
Packet tampering
Malicious Insiders
Root
Flashing
23. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Testing
Distributed Denial of Service (DDoS)
Brute Force Attack
Insiders
24. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Macro
What is asymmetic encryption?
Phishing
25. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
Character
Firewall logs
Dwell Time
26. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Router
Clickjacking
Macro
Cipher locks
27. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Offline cracking
War Driving
Extreme Humidity
Hybird
28. The process of verifying that your backups actually work
RADIUS
Orphaned
Firewall logs
Testing
29. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
White box
Federated identity management
Honeypot
Web security gateway
30. A ____ means that the application or service assigned to that port is listening for any instructions.
Authentication
Phishing
Cipher locks
Open Port
31. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Physical security access control measures
External Threat
IEEE 802.1x
Man-made Threat
32. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
IEEE 802.1x
Cloud computing
PAT
TCP/IP
33. How often you perform your backups (cost-benefit analysis of backing up)
Backup frequency
IEEE 802.1x
Man-made Threat
Trusted OS
34. A firewall that can block designated types of traffic from entering a protected network.
Content-Filtering Firewall
Amart card
Hoaxes
Testing
35. A technique that allows private IP addresses to be used on the public Internet.
Rootkit
NAT
Media for backups
Replay
36. Can be used to determine whether new IP addresses are attempting to probe the network.
Web security gateway
Cipher locks
Firewall logs
LEAP
37. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
UDP Flood
Content-Filtering Firewall
Wireless VLANs
38. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Evil Twin
OAuth
Subject
Fake Antivirus
39. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
70
Extreme temperatures
ACL (Access Control List)
Authentication
40. A variety of threats such as viruses - worms - and Trojan horses
Bluejacking
Word Splitting
Malicious code
70
41. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Man-in-the-Middle Attack
Character
Role Based Access Control
Malicious Insiders
42. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Private
Rootkit
Phishing
VPN
43. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Distributed Denial of Service (DDoS)
SYN Flood
Rogue
Cognitive biometrics
44. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Drive-by Download
Packet filtering
Biometrics
Bluejacking
45. Securing a restricted area by erecting a barrier is called ____.
Symmetric encryption
Client_Hello
NAT
Fencing
46. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
ACL (Access Control List)
Cyberterrorist
Stateless Firewall
Spimming
47. A group of piconets in which connections exist between different piconets is called a ____.
Scatternet
Symmetric encryption
Spoofing
Virtualization
48. Viruses and worms are said to be self-____.
Encryption
Replicating
War Driving
Firewall logs
49. An attack that forces a user to unintentionally click a link.
Wireless VLANs
Shoulder Surfing
Clickjacking
Identity management
50. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Authentication
Content-Filtering Firewall
Floor Guard
DNS Hijacking