SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Swiss Cheese
Hoaxes
Flaming
RADIUS
2. ____ is an image spam that is divided into multiple images.
DNS
GIF Layering
Ciphertext
ACL (Access Control List)
3. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Physical security access control measures
EAP
DNS poisoning
Sniffer
4. A means of managing and presenting computer resources by function without regard to their physical layout or location.
Stateful Firewall
Virtualization
Bluesnarfing
White box
5. A group of piconets in which connections exist between different piconets is called a ____.
Port Scanner
Electronic Activist (hacktivist)
Scatternet
Cyberstalking/Harassment
6. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Two factor security
Dumpster Diving
TCP/IP
Clickjacking
7. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Web security gateway
Bluejacking
Authentication request
TACACS
8. To create a rainbow table - each ____ begins with an initial password that is encrypted.
Human memory
Distributed Denial of Service (DDoS)
Encryption
Chain
9. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Authentication
70
Wireless security
Open Port
10. Sifting through a company's garbage to find information to help break into their computers
Fake Antivirus
NAT
Dumpster Diving
Extreme Humidity
11. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Virtualization
EAP
Bluejacking
Open Port
12. A ____ encrypts all data that is transmitted between the remote device and the network.
VPN
Electronic eavesdropping
Authentication
Replicating
13. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
EAP
UDP Flood
Electronic Vandal
14. Web application attacks are considered ____ attacks.
Wireless security
Cipher locks
Cyberstalking/Harassment
Server-Side
15. Requires mutual authentication used for WLAN encryption using Cisco client software.
LEAP
Bluesnarfing
Identity Theft
Rootkit
16. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Insiders
CHAP (Challenge Handshake Authentication Protocol)
Social engineering
Bluejacking
17. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Mouse Trapping
Internal Threat
Human memory
Chain
18. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Mouse Trapping
TCP/IP
Flashing
Man-in-the-Middle Attack
19. ____ attacks are responsible for half of all malware delivered by Web advertising.
Router
Dwell Time
Fake Antivirus
Hash encoding
20. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Identity Theft
TCP/IP
Password
SYN Flood
21. The most restrictive access control model is ____.
Fake Antivirus
Mandatory Access Control
DNS Hijacking
Dwell Time
22. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Cipher locks
Hacker
Encryption
Hoaxes
23. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Human memory
Private
Hoaxes
Rainbow Tables
24. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Shoulder Surfing
What is asymmetic encryption?
Bluejacking
Smurf Attack
25. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Rogue
War Driving
Content-Filtering Firewall
Man-made Threat
26. Users who access a Web server are usually restricted to the ____ directory.
Authorization
Root
Fencing
Cyberterrorist
27. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Electronic Activist (hacktivist)
Open Port
Flaming
Wireless VLANs
28. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Malicious Insiders
Kerberos
Honeypot
Replay
29. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
SSO
CCTV
OAuth
Identity Theft
30. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Dumpster Diving
Impersonation
Floor Guard
Hoaxes
31. It accepts spoken words for input as if they had been typed on the keyboard.
White box
DNS
Speech recognition
What is asymmetic encryption?
32. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Operation
Locking Cabinets
Replay Attack
Drive-by Download
33. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Distributed storage
Bluesnarfing
Physical security
Script Kiddie
34. An attack that forces a user to unintentionally click a link.
Malicious code
Security
Clickjacking
Standard biometrics
35. A ____ is designed to separate a nonsecured area from a secured area.
War Driving
Mantrap
Man-made Threat
Amart card
36. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Vishing
Natural Threat
Mouse Trapping
Locking Cabinets
37. ____ can be prewired for electrical power as well as wired network connections.
Mandatory Access Control
Eavesdropping Attack
Locking Cabinets
Proximity reader
38. The weakness of passwords centers on ____.
Honeynet
70
Distributed
Human memory
39. Could become a key element in authentication in the future.
Cognitive biometrics
Standard biometrics
Natural Threat
Mandatory Access Control
40. A security analysis of the transaction within its approved context.
computer footprint
ICMP Flood
Content inspection
Cyber Theft
41. Fingerprints and patterns
Bluejacking
GIF Layering
Standard biometrics
BioMetric devices
42. People very knowledgeable about computers who use their knowledge to invade other people's computers
IEEE 802.1x
UDP Flood
Authorization
Hacker
43. Using a single authentication credential that is shared across multiple networks.
Bluejacking
Identity management
Mandatory Access Control
Adware
44. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
MPack
Bluesnarfing
Insiders
Smurf Attack
45. Forwards packets across computer networks.
Kerberos
Router
Spoofing
Wireless VLANs
46. A set of permissions that are attached to an object.
SSO
Roller barrier
ACL
Social engineering
47. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Firewalls
ACL (Access Control List)
Client_Hello
DNS
48. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
External Threat
TACACS
MPack
Roller barrier
49. Password and BioMetric
Phishing
Two factor security
Data
Server-Side
50. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Geometric variance
Cybercriminals
Stateful packet filtering
BioMetric devices