SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Users who access a Web server are usually restricted to the ____ directory.
Digital Certificate
SYN Flood
Root
Geometric variance
2. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Challenge
Prevention and detection
Security
Electronic Activist (hacktivist)
3. Below 40% or above 50%
Extreme Humidity
Word Splitting
Prevention and detection
70
4. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Proximity reader
Access Control
Flaming
Eavesdropping Attack
5. The process of giving someone permission to do or have something
Malicious Insiders
Hybird
Subject
Authorization
6. Forwards packets across computer networks.
Router
Replay
Eavesdropping Attack
Extreme temperatures
7. The set of letters - symbols - and characters that make up the password are known as a ____ set.
TACACS
Character
MPack
Firewall logs
8. When organizations use software that filters content to prevent the transmission of unauthorized information
Virus
Buffer Overflow
Standard biometrics
Content filtering
9. An attacker slips through a secure area following a legitimate employee.
EAP
Subject
Router
Tailgating
10. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Worm
Information security
Black Hat
Tailgate sensors
11. People very knowledgeable about computers who use their knowledge to invade other people's computers
Hoaxes
Client_Hello
Operation
Hacker
12. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Flashing
Packet filtering
Client_Hello
Virtualization
13. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
CardSpace
Physical security access control measures
Internal Threat
Web security gateway
14. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Adware
Stateful Firewall
Firewalls
Cybercriminals
15. Password and BioMetric
Password Crackers
Two factor security
DNS Log
Whaling
16. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
ACL
Physical security access control measures
Bluejacking
White box
17. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Backup frequency
Virus
Hardware Attack
18. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Bluejacking
SYN Flood
Orphaned
Physical security
19. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Vishing
Roller barrier
Open Port
Packet filtering
20. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Amart card
BioMetric devices
Offline cracking
Rogue
21. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Server-Side
GIF Layering
Biometrics
Social engineering
22. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Cybercriminals
Electronic Activist (hacktivist)
Word Splitting
Brute Force
23. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
Cloud computing
Prevention and detection
Stateless Firewall
24. Sifting through a company's garbage to find information to help break into their computers
Cracker
Firewall logs
Extreme temperatures
Dumpster Diving
25. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Sniffer
Access Control
Challenge
White Hat
26. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Distributed Denial of Service (DDoS)
Digital Certificate
Extreme Humidity
Cyberbullying
27. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
DMS (Demilitarized Zone)
Kerberos
Amart card
LEAP
28. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Content inspection
Logic Bomb
Rainbow Tables
Account expiration
29. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Virus
Mouse Trapping
PAT
Protocol analyzer
30. Allows a single access point to service different types of users.
What is asymmetic encryption?
Authentication
Insiders
Wireless VLANs
31. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
RADIUS
Stateless Firewall
Role Based Access Control
32. ____ is an image spam that is divided into multiple images.
Role Based Access Control
GIF Layering
Separation of duties
Association request
33. An attacker motivated by the ideology to attack computer or infrastructure networks.
Content-Filtering Firewall
Cyberterrorist
Virtualization
Internal Threat
34. Ensures that messages are not corrupt or tampered with
DNS poisoning
Boot
Hash encoding
Role Based Access Control
35. Requires mutual authentication used for WLAN encryption using Cisco client software.
Flaming
Black Hat
LEAP
computer footprint
36. A private key and public key
Association request
Load balancing
Geometric variance
What is asymmetic encryption?
37. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
70
Physical security
Role
Cloud computing
38. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Brute Force
Smurf Attack
CCTV
Loop Protection
39. An AP that is set up by an attacker.
PAT
Authentication
Evil Twin
Orphaned
40. A group of piconets in which connections exist between different piconets is called a ____.
Scatternet
Eavesdropping Attack
Account expiration
Identity Theft
41. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Standard biometrics
Brute Force
computer footprint
Brute Force Attack
42. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Smurf Attack
Fake Antivirus
Adware
Human memory
43. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Floor Guard
Script Kiddie
Brute Force Attack
Proximity reader
44. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Shoulder Surfing
Physical security access control measures
Malicious code
45. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Orphaned
Port Scanner
SYN Flood
Electronic Activist (hacktivist)
46. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
Server-Side
Cyberbullying
Wireless VLANs
47. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Malicious code
Whaling
Standard biometrics
48. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Amart card
Script Kiddie
What is asymmetic encryption?
Port Scanner
49. The process of verifying that your backups actually work
Roller barrier
Testing
Two factor security
Root
50. The action that is taken by the subject over the object is called a ____.
ACL
Encryption
Three-Way Handshake
Operation