SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Amart card
Session hijacking
Bluesnarfing
Operation
2. An attacker slips through a secure area following a legitimate employee.
Identity management
GIF Layering
Cyber Theft
Tailgating
3. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Extreme temperatures
Token
Distributed Denial of Service (DDoS)
Hardware Attack
4. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Stateless Firewall
War Driving
Bluejacking
Flaming
5. An attacker motivated by the ideology to attack computer or infrastructure networks.
Cognitive biometrics
Cyberterrorist
Cyberbullying
Phishing
6. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Rogue
Electronic Vandal
Cipher locks
Fencing
7. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Distributed
Rule Based Access Control
Wireless VLANs
CHAP (Challenge Handshake Authentication Protocol)
8. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Sniffer
DNS
computer footprint
Speech recognition
9. Floods a Web site with so many requests for service that it slows down or crashes the site
Denial of service attack
CardSpace
Eavesdropping Attack
Electronic eavesdropping
10. Pretending to be another person.
SYN Flood
Impersonation
Backup frequency
Physical security access control measures
11. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Mantrap
Hash encoding
Cyber Theft
Resident
12. A threat that originates from outside the company. (ex. power failure.)
Root
EAP
External Threat
Identity Theft
13. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Hybird
Orphaned
Scatternet
Eavesdropping Attack
14. A set of permissions that are attached to an object.
Role
Token
ACL
Bluejacking
15. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
Testing
VPN
Smurf Attack
16. Sifting through a company's garbage to find information to help break into their computers
BioMetric devices
Sniffer
Hash encoding
Dumpster Diving
17. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Cyberstalking/Harassment
Bluejacking
Denial of service attack
Locking Cabinets
18. A ____ virus infects the Master Boot Record of a hard disk drive.
Hoaxes
Identification
DNS Hijacking
Boot
19. A firewall that can block designated types of traffic from entering a protected network.
Content-Filtering Firewall
Roller barrier
Loop Protection
SSO
20. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Cybercriminals
Distributed
White box
Flashing
21. It is able to code and decode data
Symmetric encryption
Electronic Activist (hacktivist)
CHAP (Challenge Handshake Authentication Protocol)
Floor Guard
22. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Virtualization
Federated identity management
Drive-by Download
Electronic Vandal
23. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Media for backups
Extreme Humidity
Standard biometrics
Distributed
24. Form of phishing that targets wealthy individuals.
Whaling
Cognitive biometrics
Electronic Vandal
Protocol analyzer
25. A private key and public key
Testing
Spear Phishing
What is asymmetic encryption?
Bluesnarfing
26. Ensures that messages are not corrupt or tampered with
Logic Bomb
Man-made Threat
Hash encoding
Backup frequency
27. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Impersonation
Root
Social engineering
Hacker
28. When DNS servers exchange information among themselves it is known as a ____.
Malicious Insiders
Zone transfer
Identity Theft
EAP
29. ____ can be prewired for electrical power as well as wired network connections.
Cracker
Virtualization
Locking Cabinets
DAC
30. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Cyberbullying
Root
Hoaxes
Replicating
31. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Backup frequency
MPack
Client_Hello
Environmental Threat
32. A form of filtering that blocks only sites specified as harmful.
Eavesdropping Attack
Fake Antivirus
Blacklisting Software
Firewall logs
33. A pay-per-use computing model in which customers pay only for the computing resources they need.
Private
Cloud computing
Internal Threat
Swiss Cheese
34. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
ARP Poisoning
Firewalls
Character
Brute Force
35. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Role Based Access Control
Evil Twin
DNS poisoning
White Hat
36. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Spimming
Mantrap
Operation
Cognitive biometrics
37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Root
Firewall logs
Vishing
Trusted OS
38. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
RADIUS
Role Based Access Control
Trojan-horse virus
Social engineering
39. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Social engineering
War Driving
Macro
computer footprint
40. The ____ model is the least restrictive.
Cyberstalking/Harassment
Cracker
Root
DAC
41. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Rogue
Smurf Attack
Replay Attack
Cyber Theft
42. A ____ means that the application or service assigned to that port is listening for any instructions.
Authorization
Open Port
Malicious code
Backup frequency
43. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Media for backups
Hardware Attack
Human memory
Identity management
44. Could become a key element in authentication in the future.
Cognitive biometrics
Prevention and detection
Authorization
Replay
45. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Phishing
Fake Antivirus
Malicious Insiders
Ciphertext
46. Viruses and worms are said to be self-____.
Blacklisting Software
Replicating
Hybird
Spoofing
47. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Authentication request
Physical security access control measures
Content filtering
TACACS
48. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
UDP Flood
Router
PAT
Physical security access control measures
49. Password and BioMetric
Two factor security
Offline cracking
Replay Attack
Proximity reader
50. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Hash encoding
Macro
Man-made Threat
Cipher locks