SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
ACL
DMS (Demilitarized Zone)
LEAP
2. People very knowledgeable about computers who use their knowledge to invade other people's computers
Mandatory Access Control
Hacker
Floor Guard
Electronic Vandal
3. A ____ virus infects the Master Boot Record of a hard disk drive.
Environmental Threat
Offline cracking
Electronic Activist (hacktivist)
Boot
4. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Blacklisting Software
Replay
EAP
Replay Attack
5. How secure the data in your backups is-can use physical security or encryption
White Hat
Security
Script Kiddie
Man-made Threat
6. A firewall capable of monitoring a data stream from end to end.
Stateful Firewall
Zone transfer
Man-made Threat
Denial of service attack
7. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Rainbow Tables
Flaming
DNS
Resident
8. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Reverse proxy
Character
Dwell Time
Role Based Access Control
9. A group of piconets in which connections exist between different piconets is called a ____.
Insiders
Scatternet
OAuth
Identity management
10. A ____ is designed to separate a nonsecured area from a secured area.
Sniffer
Mantrap
Social engineering
Role Based Access Control
11. A security analysis of the transaction within its approved context.
Content inspection
Logic Bomb
Hacker
Authentication
12. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Password
Proximity reader
Web security gateway
Worm
13. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Vishing
Protocol analyzer
Mouse Trapping
Smurf Attack
14. Viruses and worms are said to be self-____.
Access Control
Hash encoding
Prevention and detection
Replicating
15. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Mouse Trapping
Floor Guard
White Hat
Hoaxes
16. Allows a single access point to service different types of users.
ICMP Flood
Wireless VLANs
Tailgating
DAP
17. It accepts spoken words for input as if they had been typed on the keyboard.
Port Scanner
Wireless security
Ciphertext
Speech recognition
18. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
computer footprint
Symmetric encryption
70
Protocol analyzer
19. Wants to cause as much damage as possible - without a particular target or goal.
Mantrap
Electronic Vandal
DMS (Demilitarized Zone)
LEAP
20. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Script Kiddie
Worm
SYN Flood
Identification
21. Can create entries in a log for all queries that are received.
Logic Bomb
DNS Log
70
Environmental Threat
22. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Brute Force
Wireless security
Swiss Cheese
Spyware
23. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Electronic Activist (hacktivist)
WEP (Wired Equivalent Privacy)
Stateful packet filtering
Environmental Threat
24. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
Standard biometrics
Bluesnarfing
Blacklisting Software
25. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
DNS Hijacking
Buffer Overflow
Geometric variance
Virus
26. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Hardware Attack
Black Hat
Identity Theft
Cybercriminals
27. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Word Splitting
Identity Theft
Authentication
What is asymmetic encryption?
28. Below 40% or above 50%
Rootkit
Extreme Humidity
DLP
Authentication
29. A ____ means that the application or service assigned to that port is listening for any instructions.
Cyberterrorist
Drive-by Download
Malicious Insiders
Open Port
30. Provides a greater degree of security by implementing port-based authentication.
IEEE 802.1x
Client_Hello
Insiders
DLP
31. When organizations use software that filters content to prevent the transmission of unauthorized information
Hoaxes
Content filtering
White Hat
Man-in-the-Middle Attack
32. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
Electronic Vandal
Electronic Activist (hacktivist)
PAT
33. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Standard biometrics
Distributed storage
Bluesnarfing
War Driving
34. A technique that allows private IP addresses to be used on the public Internet.
Backup scope
Environmental Threat
UDP Flood
NAT
35. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Rogue
RADIUS
Client_Hello
Reverse proxy
36. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Insiders
Floor Guard
Blacklisting Software
Dwell Time
37. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Chain
Loop Protection
Port Scanner
TCP/IP
38. A set of permissions that are attached to an object.
Natural Threat
Resident
ACL
Offline cracking
39. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
RADIUS
SSO
Resident
Electronic Vandal
40. Can also capture transmissions that contain passwords.
Word Splitting
Protocol analyzer
LDAP injection
ACL
41. The most restrictive access control model is ____.
DNS poisoning
Malicious Insiders
Black Hat
Mandatory Access Control
42. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Firewall logs
Social engineering
MPack
Three-Way Handshake
43. An authentication process that involves three steps.
Cybercriminals
Fencing
Packet tampering
Three-Way Handshake
44. An attacker slips through a secure area following a legitimate employee.
Identification
Tailgating
Flaming
Mouse Trapping
45. It is able to code and decode data
Symmetric encryption
Wireless security
Protocol analyzer
Distributed storage
46. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Cognitive biometrics
Spear Phishing
War Driving
Blacklisting Software
47. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Account expiration
Spear Phishing
Bluesnarfing
Content inspection
48. Pretending to be another person.
Cloud computing
Boot
Packet tampering
Impersonation
49. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Blacklisting Software
ACL (Access Control List)
Root
BioMetric devices
50. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Security
Symmetric encryption
Rogue
Virtualization
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests