SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Password and BioMetric
Two factor security
Authentication request
Authentication
Account expiration
2. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Rogue
Challenge
RADIUS
Media for backups
3. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Hybird
Chain
computer footprint
CHAP (Challenge Handshake Authentication Protocol)
4. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Boot
70
Natural Threat
Separation of duties
5. Hides inside other software - usually as an attachment or a downloadable file
Trojan-horse virus
Private
Insiders
Dwell Time
6. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
DNS poisoning
Load balancing
Kerberos
CHAP (Challenge Handshake Authentication Protocol)
7. Can also capture transmissions that contain passwords.
Protocol analyzer
SSO
Information security
Extreme temperatures
8. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Swiss Cheese
Distributed Denial of Service (DDoS)
Denial of service attack
Cognitive biometrics
9. A ____ virus infects the Master Boot Record of a hard disk drive.
Boot
Malicious code
Content inspection
Authentication
10. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
History
ICMP Flood
DNS
ARP Poisoning
11. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
DNS Hijacking
CHAP (Challenge Handshake Authentication Protocol)
Subject
12. Can be used to determine whether new IP addresses are attempting to probe the network.
War Driving
Physical security
Firewall logs
Cognitive biometrics
13. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
War Driving
Cyberterrorist
DNS
14. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Clickjacking
Hybird
MPack
Identity Theft
15. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Honeypot
MPack
Proximity reader
Resident
16. An authentication process that involves three steps.
Encryption
Three-Way Handshake
Distributed storage
Separation of duties
17. Wants to cause as much damage as possible - without a particular target or goal.
Bluejacking
Social engineering
Electronic Vandal
Word Splitting
18. Form of phishing that targets wealthy individuals.
Hacker
Whaling
Honeynet
Cognitive biometrics
19. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Password Crackers
TCP/IP
Whaling
Shoulder Surfing
20. An attack that forces a user to unintentionally click a link.
Identity management
Shoulder Surfing
Physical security access control measures
Clickjacking
21. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Swiss Cheese
Bluejacking
Cyberstalking/Harassment
Loop Protection
22. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
CHAP (Challenge Handshake Authentication Protocol)
Session hijacking
Private
Trusted OS
23. Small electronic devices that change user passwords automatically
Whaling
Clickjacking
Cognitive biometrics
Token
24. A user under Role Based Access Control can be assigned only one ____.
Rainbow Tables
Role
TACACS
Dwell Time
25. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Open Port
Worm
DNS Log
Cipher locks
26. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Cybercriminals
Ciphertext
Content-Filtering Firewall
Cloud computing
27. Could become a key element in authentication in the future.
DAP
LDAP injection
Cognitive biometrics
LEAP
28. A commonly used technique by pornography sites where a user gets "locked" in a web site.
ACL
Testing
Mantrap
Mouse Trapping
29. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Firewalls
Identity Theft
TCP/IP
Eavesdropping Attack
30. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
RADIUS
Replay Attack
Cognitive biometrics
Insiders
31. Often used for managing user access to one or more systems.
White Hat
Rule Based Access Control
History
Human memory
32. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Geometric variance
TACACS
Amart card
Proximity reader
33. Web application attacks are considered ____ attacks.
Identification
Server-Side
Phishing
Drive-by Download
34. Requires mutual authentication used for WLAN encryption using Cisco client software.
LEAP
Resident
Electronic Vandal
Wireless security
35. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
White Hat
Proximity reader
Flaming
Digital Certificate
36. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Replay Attack
Mouse Trapping
Evil Twin
SYN Flood
37. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Chain
Character
Proximity reader
38. A ____ attack is similar to a passive man-in-the-middle attack.
Authorization
Firewall logs
Identity Theft
Replay
39. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Packet filtering
Macro
History
ARP Poisoning
40. Below 40% or above 50%
TCP/IP
Adware
Buffer Overflow
Extreme Humidity
41. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Stateful packet filtering
Malicious Insiders
Loop Protection
Cyberstalking/Harassment
42. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Social engineering
Stateless Firewall
Mantrap
GIF Layering
43. Broadcast storms can be prevented with ____.
Backup scope
Replicating
Loop Protection
Cybercriminals
44. Indicates when an account is no longer active.
DAC
DNS Log
Rogue
Account expiration
45. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Account expiration
Adware
Packet filtering
Association request
46. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Chain
MPack
Honeypot
Phishing
47. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Spear Phishing
Environmental Threat
Access Control
Biometrics
48. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Tailgate sensors
Adware
Logic Bomb
Standard biometrics
49. The weakness of passwords centers on ____.
Honeynet
Hardware Attack
Human memory
Reverse proxy
50. Can create entries in a log for all queries that are received.
Content filtering
Replay
DNS Log
Fencing