SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer crimes involving the theft of money
Cyber Theft
Role Based Access Control
Bluejacking
Hash encoding
2. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
History
Cipher locks
IEEE 802.1x
Smurf Attack
3. It accepts spoken words for input as if they had been typed on the keyboard.
Distributed
Evil Twin
Kerberos
Speech recognition
4. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Buffer Overflow
Evil Twin
Reverse proxy
5. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Challenge
computer footprint
Social engineering
Password
6. Forwards packets across computer networks.
Router
Password
Cybercriminals
Dwell Time
7. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Spimming
DMS (Demilitarized Zone)
Biometrics
RADIUS
8. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
DAP
Bluesnarfing
Social engineering
Rainbow Tables
9. A technique that allows private IP addresses to be used on the public Internet.
NAT
Evil Twin
Authentication request
Cybercriminals
10. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
BioMetric devices
Association request
History
Authentication
11. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Logic Bomb
Resident
Firewalls
Whaling
12. A threat that originates from outside the company. (ex. power failure.)
External Threat
Distributed Denial of Service (DDoS)
Spyware
War Driving
13. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Standard biometrics
Virtualization
Access Control
Worm
14. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Media for backups
Data
Chain
Bluesnarfing
15. An attacker slips through a secure area following a legitimate employee.
Blacklisting Software
Tailgating
Scatternet
ICMP Flood
16. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Spear Phishing
White box
Separation of duties
Honeynet
17. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Spyware
Natural Threat
DAP
Kerberos
18. Software that can guess passwords
CCTV
Password Crackers
Mantrap
Physical security
19. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Spear Phishing
Hoaxes
DNS
LEAP
20. An authentication process that involves three steps.
ACL (Access Control List)
Hybird
Three-Way Handshake
Virus
21. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
DMS (Demilitarized Zone)
Brute Force Attack
Extreme temperatures
Root
22. Sifting through a company's garbage to find information to help break into their computers
Word Splitting
Packet filtering
Dumpster Diving
Load balancing
23. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
DAP
Spimming
Private
Internal Threat
24. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Trusted OS
Drive-by Download
Physical security access control measures
Environmental Threat
25. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Association request
Black Hat
Brute Force
Physical security access control measures
26. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Load balancing
Backup frequency
War Driving
Smurf Attack
27. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
CCTV
Protocol analyzer
Testing
Spimming
28. How many past backups you keep - what you did on your machine etc.
White Hat
VPN
LDAP injection
History
29. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Virus
Amart card
Orphaned
Swiss Cheese
30. A security analysis of the transaction within its approved context.
Macro
Content inspection
Firewalls
Human memory
31. Can create entries in a log for all queries that are received.
DNS Log
Backup frequency
Virus
Word Splitting
32. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Kerberos
RADIUS
Offline cracking
Replay Attack
33. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Resident
Bluesnarfing
Social engineering
Fake Antivirus
34. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Hardware Attack
Fencing
White box
Operation
35. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Port Scanner
Whaling
OAuth
Internal Threat
36. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Phishing
Firewalls
Man-made Threat
Federated identity management
37. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Spear Phishing
LDAP injection
Cyber Theft
Replay
38. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Whaling
Content-Filtering Firewall
DNS
Open Port
39. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
DNS poisoning
Hacker
SYN Flood
Packet tampering
40. An attacker motivated by the ideology to attack computer or infrastructure networks.
Macro
Man-made Threat
Cyberterrorist
Impersonation
41. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
NAT
ACL
Three-Way Handshake
42. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Eavesdropping Attack
Malicious code
Stateful packet filtering
Stateful Firewall
43. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Cyberstalking/Harassment
Hybird
Content filtering
Load balancing
44. Users who access a Web server are usually restricted to the ____ directory.
Root
OAuth
Bluesnarfing
UDP Flood
45. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
WEP (Wired Equivalent Privacy)
Clickjacking
Stateless Firewall
Mandatory Access Control
46. A method for confirming users' identities
Authentication
Honeypot
Distributed Denial of Service (DDoS)
Spear Phishing
47. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Rogue
Honeypot
Cyber Theft
Load balancing
48. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Sniffer
SSO
Fake Antivirus
Word Splitting
49. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Ciphertext
Hash encoding
Open Port
Vishing
50. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Ciphertext
Spyware
CHAP (Challenge Handshake Authentication Protocol)
Rainbow Tables