SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Hoaxes
Natural Threat
Geometric variance
What is asymmetic encryption?
2. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
SYN Flood
Eavesdropping Attack
DNS
War Driving
3. It accepts spoken words for input as if they had been typed on the keyboard.
Resident
Electronic eavesdropping
Speech recognition
Man-in-the-Middle Attack
4. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Roller barrier
NAT
Security
Environmental Threat
5. A framework for transporting authentication protocols instead of the authentication protocol itself.
Authentication
EAP
DNS poisoning
Cipher locks
6. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
RADIUS
VPN
Whaling
White Hat
7. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Backup scope
Cybercriminals
Data
Token
8. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Clickjacking
Virus
Human memory
Symmetric encryption
9. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Brute Force
Honeynet
Stateless Firewall
Media for backups
10. People very knowledgeable about computers who use their knowledge to invade other people's computers
Authentication request
Hacker
Amart card
Biometrics
11. Floods a Web site with so many requests for service that it slows down or crashes the site
Federated identity management
Token
Electronic eavesdropping
Denial of service attack
12. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Mandatory Access Control
CHAP (Challenge Handshake Authentication Protocol)
Authentication
Cyberstalking/Harassment
13. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Orphaned
Wireless security
DAP
Hacker
14. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Character
Amart card
Hardware Attack
Content-Filtering Firewall
15. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Client_Hello
Role Based Access Control
SYN Flood
TCP/IP
16. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Hoaxes
Spoofing
Trojan-horse virus
Man-in-the-Middle Attack
17. Lock - conduit - card key - video equipment - secured guard
Physical security access control measures
LEAP
Load balancing
Kerberos
18. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Speech recognition
Kerberos
UDP Flood
19. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Subject
Media for backups
Wireless security
Backup frequency
20. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Environmental Threat
Content-Filtering Firewall
Trusted OS
UDP Flood
21. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Worm
Physical security access control measures
Identity Theft
Flashing
22. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Association request
Spimming
Man-in-the-Middle Attack
Stateful packet filtering
23. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Distributed
Content inspection
Denial of service attack
MPack
24. The process of giving someone permission to do or have something
Replay Attack
Biometrics
Insiders
Authorization
25. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
MPack
Flashing
DAP
ACL (Access Control List)
26. A ____ virus infects the Master Boot Record of a hard disk drive.
Rootkit
Cloud computing
Worm
Boot
27. A ____ attack is similar to a passive man-in-the-middle attack.
Replay
Chain
LDAP injection
VPN
28. A technique that allows private IP addresses to be used on the public Internet.
NAT
Spimming
Account expiration
SYN Flood
29. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Phishing
Replay Attack
Router
Password Crackers
30. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Shoulder Surfing
Logic Bomb
Cloud computing
War Driving
31. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Authentication request
PAT
Spimming
Whaling
32. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
What is asymmetic encryption?
70
Black Hat
Loop Protection
33. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Drive-by Download
Denial of service attack
White Hat
Stateful packet filtering
34. A security analysis of the transaction within its approved context.
Fake Antivirus
DNS
Content inspection
Cipher locks
35. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Man-in-the-Middle Attack
DNS Hijacking
White box
Insiders
36. ____ attacks are responsible for half of all malware delivered by Web advertising.
Mouse Trapping
Speech recognition
Fake Antivirus
Open Port
37. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
Biometrics
Private
Man-made Threat
38. The time it takes for a key to be pressed and then released.
Cognitive biometrics
Dwell Time
Fencing
Mandatory Access Control
39. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Biometrics
Social engineering
Locking Cabinets
Honeypot
40. A set of permissions that are attached to an object.
Fencing
Firewall logs
ACL
UDP Flood
41. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
VPN
Three-Way Handshake
Hacker
OAuth
42. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
70
Flaming
Evil Twin
Three-Way Handshake
43. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
Replay Attack
GIF Layering
Brute Force Attack
44. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Character
Spear Phishing
Session hijacking
Bluejacking
45. A user under Role Based Access Control can be assigned only one ____.
CardSpace
VPN
Role
Internal Threat
46. A group of piconets in which connections exist between different piconets is called a ____.
Internal Threat
Web security gateway
Firewall logs
Scatternet
47. Fingerprints and patterns
BioMetric devices
Blacklisting Software
Server-Side
Worm
48. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Logic Bomb
GIF Layering
Macro
LDAP injection
49. A form of filtering that blocks only sites specified as harmful.
Hacker
Blacklisting Software
OAuth
Two factor security
50. When DNS servers exchange information among themselves it is known as a ____.
Zone transfer
Packet tampering
Content filtering
DAC