SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can also capture transmissions that contain passwords.
Electronic Vandal
Protocol analyzer
Internal Threat
Scatternet
2. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Identification
Roller barrier
Black Hat
Hardware Attack
3. Provides a greater degree of security by implementing port-based authentication.
Hybird
IEEE 802.1x
VPN
Bluejacking
4. Due to the limitations of online guessing - most password attacks today use ____.
Chain
Offline cracking
Word Splitting
Bluesnarfing
5. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Replay Attack
Loop Protection
IEEE 802.1x
Stateless Firewall
6. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Hybird
Media for backups
Federated identity management
Packet tampering
7. Allows a single access point to service different types of users.
Two factor security
Server-Side
Wireless VLANs
Script Kiddie
8. A technique for crashing by sending too much data to the buffer in a comuter's memory
Chain
Buffer Overflow
SSO
Adware
9. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Boot
Trojan-horse virus
Data
Proximity reader
10. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Orphaned
Bluejacking
Shoulder Surfing
11. Form of phishing that targets wealthy individuals.
Locking Cabinets
Whaling
Mantrap
Cognitive biometrics
12. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Smurf Attack
Cyberbullying
Zone transfer
Spyware
13. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Cipher locks
Distributed
Testing
Mandatory Access Control
14. Often used for managing user access to one or more systems.
Rule Based Access Control
Natural Threat
RADIUS
Standard biometrics
15. A secret combination of letters - numbers - and/or characters that only the user should know.
Federated identity management
Open Port
Password
Black Hat
16. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Insiders
RADIUS
Physical security access control measures
Identity management
17. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Stateful packet filtering
Whaling
Root
TACACS
18. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Spimming
Hacker
WEP (Wired Equivalent Privacy)
Word Splitting
19. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Physical security access control measures
Distributed Denial of Service (DDoS)
Cracker
EAP
20. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Content inspection
Server-Side
Subject
Brute Force Attack
21. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Three-Way Handshake
Internal Threat
Floor Guard
Macro
22. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Flashing
IEEE 802.1x
Ciphertext
Eavesdropping Attack
23. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Content inspection
Cognitive biometrics
Honeynet
OAuth
24. Content filtering - encryption - firewalls
Prevention and detection
Role
Operation
OAuth
25. A ____ is a network set up with intentional vulnerabilities.
DNS
Fake Antivirus
Amart card
Honeynet
26. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Script Kiddie
Identity management
Chain
Internal Threat
27. An attacker motivated by the ideology to attack computer or infrastructure networks.
Dwell Time
Cyberterrorist
Kerberos
Spoofing
28. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Adware
Human memory
White box
Trusted OS
29. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Cyber Theft
Phishing
Cyberbullying
Backup scope
30. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Orphaned
Offline cracking
Distributed storage
Proximity reader
31. Sifting through a company's garbage to find information to help break into their computers
Extreme Humidity
Identification
Content-Filtering Firewall
Dumpster Diving
32. Software that can guess passwords
Password Crackers
Drive-by Download
ACL
BioMetric devices
33. A threat that originates from outside the company. (ex. power failure.)
External Threat
ACL (Access Control List)
Flashing
Hybird
34. The ____ model is the least restrictive.
DAC
Proximity reader
WEP (Wired Equivalent Privacy)
Federated identity management
35. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
DMS (Demilitarized Zone)
Sniffer
Distributed
Dwell Time
36. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Swiss Cheese
Replay Attack
Character
Authentication request
37. A ____ encrypts all data that is transmitted between the remote device and the network.
VPN
Word Splitting
Chain
IEEE 802.1x
38. Fingerprints and patterns
Cyberterrorist
RADIUS
BioMetric devices
LEAP
39. A method for confirming users' identities
Drive-by Download
GIF Layering
Proximity reader
Authentication
40. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Cyber Theft
Offline cracking
Bluesnarfing
Private
41. The process of giving someone permission to do or have something
TCP/IP
DMS (Demilitarized Zone)
Authorization
Hacker
42. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Electronic Activist (hacktivist)
Port Scanner
SYN Flood
Backup frequency
43. ____ can be prewired for electrical power as well as wired network connections.
Firewalls
Macro
Locking Cabinets
DLP
44. Using a single authentication credential that is shared across multiple networks.
Identity management
Honeypot
Malicious Insiders
Cracker
45. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Insiders
Two factor security
NAT
Biometrics
46. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Malicious code
Role Based Access Control
Separation of duties
Bluejacking
47. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Impersonation
Cybercriminals
Challenge
Server-Side
48. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Distributed Denial of Service (DDoS)
Shoulder Surfing
Three-Way Handshake
DNS Log
49. ____ involves horizontally separating words - although it is still readable by the human eye.
Macro
Security
Word Splitting
Authentication request
50. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Packet tampering
NAT
CardSpace
DNS Log