SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The time it takes for a key to be pressed and then released.
Dwell Time
Mandatory Access Control
Cyber Theft
Replay Attack
2. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Information security
Cracker
Denial of service attack
Backup frequency
3. Hides inside other software - usually as an attachment or a downloadable file
Bluejacking
Spyware
Cybercriminals
Trojan-horse virus
4. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Boot
Information security
Buffer Overflow
Script Kiddie
5. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Man-made Threat
Physical security
Spyware
MPack
6. A technology that can help to evenly distribute work across a network.
Association request
Load balancing
White box
CardSpace
7. A program that is automatically downloaded to your computer without your consent or even your knowledge.
DNS
Electronic Vandal
Authentication request
Drive-by Download
8. A set of permissions that are attached to an object.
Malicious Insiders
Honeypot
Port Scanner
ACL
9. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Prevention and detection
Identification
Trusted OS
Blacklisting Software
10. How many past backups you keep - what you did on your machine etc.
History
Content-Filtering Firewall
Spear Phishing
Association request
11. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Port Scanner
Floor Guard
Hacker
Fencing
12. Provides a greater degree of security by implementing port-based authentication.
Honeypot
IEEE 802.1x
Association request
CHAP (Challenge Handshake Authentication Protocol)
13. A framework for transporting authentication protocols instead of the authentication protocol itself.
External Threat
Logic Bomb
WEP (Wired Equivalent Privacy)
EAP
14. The ____ model is the least restrictive.
IEEE 802.1x
Cyberterrorist
DAC
Wireless security
15. It accepts spoken words for input as if they had been typed on the keyboard.
GIF Layering
Authentication request
Speech recognition
Router
16. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cybercriminals
Root
Impersonation
Cyberbullying
17. Content filtering - encryption - firewalls
Mouse Trapping
Flashing
Impersonation
Prevention and detection
18. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Token
Logic Bomb
Replicating
LDAP injection
19. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
DNS Hijacking
Account expiration
Client_Hello
Reverse proxy
20. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Port Scanner
Role Based Access Control
Web security gateway
CardSpace
21. It is able to code and decode data
Cybercriminals
Zone transfer
Identity Theft
Symmetric encryption
22. ____ involves horizontally separating words - although it is still readable by the human eye.
Hardware Attack
Word Splitting
Amart card
Hoaxes
23. An attack that forces a user to unintentionally click a link.
Digital Certificate
TACACS
Clickjacking
Electronic Vandal
24. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
White box
Role
Mouse Trapping
computer footprint
25. A form of filtering that blocks only sites specified as harmful.
What is asymmetic encryption?
Drive-by Download
Blacklisting Software
Replicating
26. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
Man-made Threat
Human memory
Password
27. These accounts are user accounts that remain active after an employee has left an organization.
Two factor security
Orphaned
Malicious code
Virtualization
28. Form of phishing that targets wealthy individuals.
Whaling
Tailgate sensors
Honeynet
Hacker
29. Lock - conduit - card key - video equipment - secured guard
Router
BioMetric devices
Physical security access control measures
Hacker
30. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Locking Cabinets
Packet filtering
DNS
31. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Proximity reader
Sniffer
Role Based Access Control
Cognitive biometrics
32. Small electronic devices that change user passwords automatically
Virus
Token
Challenge
Malicious code
33. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Role
Cyber Theft
Stateless Firewall
Flashing
34. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
DNS poisoning
Geometric variance
Router
Open Port
35. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Subject
Electronic Vandal
Root
DLP
36. Can also capture transmissions that contain passwords.
TCP/IP
Protocol analyzer
Port Scanner
Rule Based Access Control
37. The action that is taken by the subject over the object is called a ____.
Tailgate sensors
CCTV
Operation
LEAP
38. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Physical security access control measures
Hardware Attack
TACACS
Federated identity management
39. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Replay
Role Based Access Control
Packet tampering
SYN Flood
40. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Macro
Content inspection
Cracker
Authentication
41. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
DAC
Encryption
Chain
TCP/IP
42. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
DMS (Demilitarized Zone)
Testing
Hoaxes
Rainbow Tables
43. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Worm
Dwell Time
Amart card
Fake Antivirus
44. When DNS servers exchange information among themselves it is known as a ____.
Access Control
Extreme Humidity
Zone transfer
Bluejacking
45. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Smurf Attack
Electronic Vandal
Hoaxes
Password Crackers
46. Floods a Web site with so many requests for service that it slows down or crashes the site
What is asymmetic encryption?
Wireless VLANs
Denial of service attack
Floor Guard
47. A ____ means that the application or service assigned to that port is listening for any instructions.
TACACS
Content filtering
Open Port
Access Control
48. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Man-in-the-Middle Attack
Hash encoding
Electronic Activist (hacktivist)
Loop Protection
49. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Cyberbullying
Flaming
Man-made Threat
Bluejacking
50. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
DNS
Cyberbullying
Insiders
Man-made Threat