SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A firewall capable of monitoring a data stream from end to end.
EAP
Scatternet
Stateful Firewall
Resident
2. The ____ model is the least restrictive.
OAuth
DAC
Electronic Vandal
Stateful packet filtering
3. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Mantrap
Insiders
History
Session hijacking
4. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Distributed Denial of Service (DDoS)
Hacker
Natural Threat
Cyberstalking/Harassment
5. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
ACL (Access Control List)
Mantrap
CCTV
Logic Bomb
6. Fingerprints and patterns
BioMetric devices
Access Control
Resident
GIF Layering
7. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Subject
Proximity reader
Physical security
SSO
8. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Script Kiddie
Clickjacking
Flashing
Rogue
9. Indicates when an account is no longer active.
DNS poisoning
Stateful packet filtering
Worm
Account expiration
10. An AP that is set up by an attacker.
SYN Flood
TACACS
UDP Flood
Evil Twin
11. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Authorization
Replicating
computer footprint
White box
12. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Token
Eavesdropping Attack
Boot
Cloud computing
13. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Ciphertext
ARP Poisoning
Server-Side
Bluesnarfing
14. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
DNS Hijacking
Sniffer
Ciphertext
Bluesnarfing
15. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Content-Filtering Firewall
Web security gateway
Trusted OS
ARP Poisoning
16. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
Floor Guard
Rogue
Rule Based Access Control
17. ____ involves horizontally separating words - although it is still readable by the human eye.
Word Splitting
computer footprint
Boot
NAT
18. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Account expiration
Role Based Access Control
WEP (Wired Equivalent Privacy)
Separation of duties
19. How many past backups you keep - what you did on your machine etc.
History
External Threat
PAT
Association request
20. When organizations use software that filters content to prevent the transmission of unauthorized information
Cybercriminals
Content filtering
Bluesnarfing
70
21. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
Password Crackers
Geometric variance
Denial of service attack
22. Hides inside other software - usually as an attachment or a downloadable file
Stateless Firewall
WEP (Wired Equivalent Privacy)
Physical security access control measures
Trojan-horse virus
23. Wants to cause as much damage as possible - without a particular target or goal.
Sniffer
Electronic Vandal
Physical security access control measures
Load balancing
24. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Insiders
DNS Hijacking
DMS (Demilitarized Zone)
Flashing
25. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Root
Stateful Firewall
Kerberos
Cognitive biometrics
26. A technique for crashing by sending too much data to the buffer in a comuter's memory
Buffer Overflow
Authentication
Backup scope
Black Hat
27. The time it takes for a key to be pressed and then released.
Dwell Time
Symmetric encryption
Whaling
NAT
28. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Role Based Access Control
Biometrics
RADIUS
External Threat
29. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Stateless Firewall
IEEE 802.1x
Word Splitting
Root
30. Viruses and worms are said to be self-____.
Hardware Attack
RADIUS
What is asymmetic encryption?
Replicating
31. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Whaling
Rainbow Tables
Mouse Trapping
Token
32. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Spear Phishing
TCP/IP
Swiss Cheese
Hardware Attack
33. An attacker motivated by the ideology to attack computer or infrastructure networks.
Evil Twin
Phishing
Cyberterrorist
History
34. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
SSO
Association request
Mouse Trapping
Biometrics
35. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Operation
Stateless Firewall
Environmental Threat
computer footprint
36. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Speech recognition
Protocol analyzer
Private
Cybercriminals
37. Related to the perception - thought process - and understanding of the user.
ICMP Flood
Cognitive biometrics
Backup scope
computer footprint
38. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Cyberstalking/Harassment
Cybercriminals
Open Port
Client_Hello
39. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Hacker
Honeynet
Whaling
Electronic eavesdropping
40. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Cyberstalking/Harassment
SSO
Prevention and detection
Role
41. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Man-made Threat
Chain
Logic Bomb
Tailgating
42. An attack that forces a user to unintentionally click a link.
computer footprint
Clickjacking
Loop Protection
NAT
43. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Worm
Word Splitting
Internal Threat
Identification
44. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Identity Theft
Resident
Prevention and detection
Encryption
45. ____ attacks are responsible for half of all malware delivered by Web advertising.
Fake Antivirus
Tailgating
History
Information security
46. A method for confirming users' identities
Authentication
Swiss Cheese
Hardware Attack
External Threat
47. The weakness of passwords centers on ____.
Human memory
Private
Fencing
Flaming
48. Allows a single access point to service different types of users.
ACL (Access Control List)
Separation of duties
Hoaxes
Wireless VLANs
49. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
CardSpace
Mouse Trapping
Zone transfer
Token
50. A private key and public key
Authorization
Bluejacking
What is asymmetic encryption?
Operation