SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Cracker
UDP Flood
Vishing
Malicious Insiders
2. Scrambles information into an alternative form that requires a key or password to decrypt the information
Dumpster Diving
Eavesdropping Attack
Password Crackers
Encryption
3. Password and BioMetric
Role Based Access Control
Man-made Threat
Two factor security
Rootkit
4. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
SSO
Physical security access control measures
Physical security
Distributed Denial of Service (DDoS)
5. An attacker slips through a secure area following a legitimate employee.
Tailgating
Hardware Attack
Blacklisting Software
Router
6. It accepts spoken words for input as if they had been typed on the keyboard.
Password
RADIUS
Trojan-horse virus
Speech recognition
7. A method for confirming users' identities
Rule Based Access Control
Tailgate sensors
RADIUS
Authentication
8. The action that is taken by the subject over the object is called a ____.
Operation
Replicating
EAP
Bluejacking
9. Due to the limitations of online guessing - most password attacks today use ____.
Orphaned
Mouse Trapping
Security
Offline cracking
10. Ensures that messages are not corrupt or tampered with
Script Kiddie
Internal Threat
Mantrap
Hash encoding
11. An attack that sends unsolicited messages to Bluetooth-enabled devices.
WEP (Wired Equivalent Privacy)
Mandatory Access Control
Bluejacking
Tailgating
12. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Speech recognition
Bluejacking
Resident
Authorization
13. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
Reverse proxy
NAT
Router
14. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Malicious code
Smurf Attack
Virtualization
Honeypot
15. Four interrelated aspects to _________:Access - data - infrastructure - computers
DNS
EAP
Load balancing
Physical security
16. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
Authorization
Denial of service attack
Man-made Threat
17. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Account expiration
Authentication request
TCP/IP
Root
18. It is able to code and decode data
Honeypot
Symmetric encryption
Role
Stateless Firewall
19. Could become a key element in authentication in the future.
Drive-by Download
Bluesnarfing
Hacker
Cognitive biometrics
20. Pretending to be another person.
Orphaned
MPack
Fencing
Impersonation
21. Small electronic devices that change user passwords automatically
Insiders
Root
Token
Clickjacking
22. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Association request
Electronic eavesdropping
Bluesnarfing
Cyberbullying
23. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.
Private
Access Control
Internal Threat
Phishing
24. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Insiders
Wireless VLANs
Bluesnarfing
Physical security
25. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Hacker
Identification
Brute Force
Hoaxes
26. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Malicious Insiders
RADIUS
LDAP injection
Eavesdropping Attack
27. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Roller barrier
Flaming
Replay Attack
Swiss Cheese
28. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Cloud computing
Port Scanner
War Driving
Environmental Threat
29. Securing a restricted area by erecting a barrier is called ____.
Cognitive biometrics
Fencing
Digital Certificate
EAP
30. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Challenge
Brute Force
Testing
31. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Role
Logic Bomb
Ciphertext
Physical security
32. A pay-per-use computing model in which customers pay only for the computing resources they need.
Flaming
Cloud computing
Whaling
Hybird
33. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Client_Hello
Honeynet
Content filtering
DMS (Demilitarized Zone)
34. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
GIF Layering
Virus
Media for backups
Biometrics
35. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Cyber Theft
Floor Guard
Ciphertext
DNS Hijacking
36. Using a single authentication credential that is shared across multiple networks.
Protocol analyzer
Human memory
Identity management
Impersonation
37. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Bluesnarfing
IEEE 802.1x
Environmental Threat
computer footprint
38. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Electronic eavesdropping
Content filtering
Federated identity management
Social engineering
39. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Mandatory Access Control
TCP/IP
Script Kiddie
Access Control
40. ____ can be prewired for electrical power as well as wired network connections.
Locking Cabinets
Cracker
Mandatory Access Control
Man-made Threat
41. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Packet tampering
Electronic Activist (hacktivist)
Private
Drive-by Download
42. A user under Role Based Access Control can be assigned only one ____.
Three-Way Handshake
ACL
Account expiration
Role
43. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Content inspection
DLP
Spoofing
Federated identity management
44. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Spear Phishing
Clickjacking
Extreme temperatures
Role Based Access Control
45. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
SSO
Bluejacking
Challenge
46. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
DMS (Demilitarized Zone)
War Driving
Digital Certificate
Rootkit
47. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Malicious code
ACL
Authentication request
Identity Theft
48. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Shoulder Surfing
Rainbow Tables
DNS poisoning
Bluejacking
49. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
MPack
Standard biometrics
Digital Certificate
Distributed storage
50. Content filtering - encryption - firewalls
Prevention and detection
TACACS
Black Hat
Bluesnarfing