SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most restrictive access control model is ____.
Mandatory Access Control
Stateful Firewall
Swiss Cheese
Flashing
2. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Hybird
Replay Attack
Security
Private
3. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Word Splitting
Backup scope
Federated identity management
Hybird
4. How often you perform your backups (cost-benefit analysis of backing up)
Firewalls
Testing
Shoulder Surfing
Backup frequency
5. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
DAP
Mantrap
Adware
Encryption
6. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Mantrap
Rootkit
CHAP (Challenge Handshake Authentication Protocol)
Stateless Firewall
7. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Electronic eavesdropping
Firewall logs
Information security
Token
8. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Tailgating
Honeypot
Bluesnarfing
Smurf Attack
9. When organizations use software that filters content to prevent the transmission of unauthorized information
DNS
Content filtering
Cloud computing
Denial of service attack
10. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Insiders
CHAP (Challenge Handshake Authentication Protocol)
Distributed
Bluesnarfing
11. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Malicious code
BioMetric devices
Amart card
Ciphertext
12. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
DAP
DNS
Hash encoding
Subject
13. How many past backups you keep - what you did on your machine etc.
Loop Protection
Roller barrier
Spear Phishing
History
14. Viruses and worms are said to be self-____.
Replicating
Tailgate sensors
Hardware Attack
Clickjacking
15. Pretending to be another person.
Impersonation
BioMetric devices
Port Scanner
Insiders
16. A ____ encrypts all data that is transmitted between the remote device and the network.
UDP Flood
Cipher locks
VPN
Offline cracking
17. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
White Hat
Wireless security
Open Port
18. Sending high volumes of ICMP (usually ping) packets to a target.
White Hat
DAP
BioMetric devices
ICMP Flood
19. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Rogue
Content inspection
White box
20. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Denial of service attack
Evil Twin
RADIUS
Three-Way Handshake
21. A private key and public key
Federated identity management
Vishing
What is asymmetic encryption?
Boot
22. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
CardSpace
Extreme temperatures
Data
Mandatory Access Control
23. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
Swiss Cheese
Role
Stateful packet filtering
24. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Two factor security
Replay
Authentication request
Content-Filtering Firewall
25. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Physical security access control measures
MPack
Security
Vishing
26. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Hacker
Swiss Cheese
ACL (Access Control List)
Drive-by Download
27. A threat that originates from outside the company. (ex. power failure.)
Environmental Threat
External Threat
White Hat
Identification
28. Software that can guess passwords
Private
Clickjacking
Wireless VLANs
Password Crackers
29. It accepts spoken words for input as if they had been typed on the keyboard.
Speech recognition
WEP (Wired Equivalent Privacy)
Cybercriminals
Reverse proxy
30. The set of letters - symbols - and characters that make up the password are known as a ____ set.
NAT
Password Crackers
Character
Tailgating
31. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Phishing
Tailgating
MPack
32. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Challenge
Clickjacking
PAT
DMS (Demilitarized Zone)
33. An authentication process that involves three steps.
Roller barrier
Three-Way Handshake
DNS Hijacking
Black Hat
34. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Resident
Session hijacking
Root
Trusted OS
35. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
White box
DNS Hijacking
Clickjacking
Operation
36. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Spimming
PAT
Spoofing
Replay Attack
37. Requires mutual authentication used for WLAN encryption using Cisco client software.
Encryption
LEAP
Bluesnarfing
Spear Phishing
38. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Cloud computing
Content filtering
Trojan-horse virus
TCP/IP
39. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
DNS poisoning
Account expiration
Rootkit
Extreme Humidity
40. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Replay Attack
Stateful packet filtering
Password
SSO
41. Can create entries in a log for all queries that are received.
Buffer Overflow
Amart card
Loop Protection
DNS Log
42. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
CCTV
Roller barrier
Stateless Firewall
VPN
43. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Trusted OS
Role
Trojan-horse virus
Cybercriminals
44. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Hoaxes
Phishing
Rootkit
Token
45. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Server-Side
Backup scope
Federated identity management
SYN Flood
46. A security analysis of the transaction within its approved context.
Content inspection
BioMetric devices
What is asymmetic encryption?
Rogue
47. Small electronic devices that change user passwords automatically
Backup scope
Cracker
TCP/IP
Token
48. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
NAT
Replay Attack
Man-in-the-Middle Attack
Swiss Cheese
49. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Session hijacking
Rootkit
Cyberstalking/Harassment
Stateful Firewall
50. It is able to code and decode data
Replay
Locking Cabinets
Shoulder Surfing
Symmetric encryption