SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Wireless security
Distributed storage
Identification
Dumpster Diving
2. An attack that forces a user to unintentionally click a link.
Token
ICMP Flood
Man-in-the-Middle Attack
Clickjacking
3. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Subject
ARP Poisoning
Tailgate sensors
BioMetric devices
4. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
ACL (Access Control List)
Dwell Time
Physical security access control measures
DNS Hijacking
5. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
War Driving
MPack
ACL (Access Control List)
EAP
6. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
BioMetric devices
Orphaned
Black Hat
Hoaxes
7. It accepts spoken words for input as if they had been typed on the keyboard.
Packet tampering
Speech recognition
SYN Flood
DNS Hijacking
8. Sending high volumes of ICMP (usually ping) packets to a target.
Bluejacking
DNS Hijacking
ICMP Flood
Drive-by Download
9. A ____ attack is similar to a passive man-in-the-middle attack.
Replay
Logic Bomb
Replicating
DNS
10. An authentication process that involves three steps.
Three-Way Handshake
Cracker
Rule Based Access Control
What is asymmetic encryption?
11. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Private
Digital Certificate
Tailgate sensors
Honeynet
12. A ____ is a network set up with intentional vulnerabilities.
Honeynet
Role Based Access Control
Hash encoding
Logic Bomb
13. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Access Control
Hacker
Boot
Server-Side
14. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Authorization
Standard biometrics
Hardware Attack
Brute Force
15. A user under Role Based Access Control can be assigned only one ____.
Role
Honeypot
Identity management
Dumpster Diving
16. Sending high volumes of UDP requests to a target.
Replicating
Chain
Spimming
UDP Flood
17. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Virtualization
Smurf Attack
Zone transfer
DAP
18. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Word Splitting
Orphaned
Worm
Distributed
19. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
TCP/IP
Open Port
Media for backups
Digital Certificate
20. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Bluejacking
Sniffer
LDAP injection
ARP Poisoning
21. A technology that can help to evenly distribute work across a network.
Flaming
Authentication
Load balancing
DAP
22. The weakness of passwords centers on ____.
Human memory
Testing
Identity management
Geometric variance
23. Due to the limitations of online guessing - most password attacks today use ____.
Social engineering
Offline cracking
Password Crackers
Private
24. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Man-in-the-Middle Attack
Script Kiddie
Boot
Association request
25. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
White Hat
Evil Twin
War Driving
Brute Force Attack
26. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Eavesdropping Attack
Replay Attack
Boot
Spoofing
27. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Challenge
Spimming
Cyberbullying
NAT
28. Fingerprints and patterns
Prevention and detection
BioMetric devices
Spoofing
Drive-by Download
29. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Logic Bomb
Virtualization
Internal Threat
Adware
30. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Extreme temperatures
Load balancing
Subject
Hybird
31. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Firewalls
Replay
Macro
ACL
32. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Identity Theft
RADIUS
Impersonation
Firewalls
33. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
Content inspection
Open Port
Server-Side
34. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Token
Electronic Activist (hacktivist)
Identity Theft
Hardware Attack
35. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Packet tampering
Brute Force Attack
Mandatory Access Control
computer footprint
36. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Rainbow Tables
Password Crackers
Prevention and detection
Separation of duties
37. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
DNS poisoning
Malicious Insiders
Eavesdropping Attack
Logic Bomb
38. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Rootkit
Macro
ACL (Access Control List)
Packet tampering
39. A variety of threats such as viruses - worms - and Trojan horses
Malicious code
DLP
Two factor security
Backup frequency
40. When DNS servers exchange information among themselves it is known as a ____.
Mandatory Access Control
Rogue
Hash encoding
Zone transfer
41. A security analysis of the transaction within its approved context.
Content inspection
Mantrap
Shoulder Surfing
Rogue
42. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Reverse proxy
Cracker
Media for backups
Hoaxes
43. The process of giving someone permission to do or have something
Authorization
DLP
Cyberstalking/Harassment
CHAP (Challenge Handshake Authentication Protocol)
44. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Replicating
Digital Certificate
SYN Flood
Two factor security
45. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Tailgate sensors
Hybird
Macro
Zone transfer
46. The process of verifying that your backups actually work
Denial of service attack
Floor Guard
Testing
Three-Way Handshake
47. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Stateful Firewall
DAC
Standard biometrics
Adware
48. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Black Hat
Protocol analyzer
What is asymmetic encryption?
History
49. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Wireless VLANs
TACACS
Tailgating
Backup scope
50. A user accessing a computer system must present credentials or ____ when logging on to the system.
Speech recognition
Token
Cyberterrorist
Identification