SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Fencing
Digital Certificate
White box
Web security gateway
2. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Character
Zone transfer
Digital Certificate
Separation of duties
3. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Standard biometrics
Social engineering
Brute Force
DNS poisoning
4. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Evil Twin
CHAP (Challenge Handshake Authentication Protocol)
Stateless Firewall
Distributed Denial of Service (DDoS)
5. A secret combination of letters - numbers - and/or characters that only the user should know.
Kerberos
computer footprint
Impersonation
Password
6. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
DMS (Demilitarized Zone)
Packet tampering
Logic Bomb
Geometric variance
7. ____ involves horizontally separating words - although it is still readable by the human eye.
Packet tampering
Information security
Firewall logs
Word Splitting
8. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Content inspection
Virus
Cracker
Man-made Threat
9. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Operation
Offline cracking
Rogue
Spyware
10. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Natural Threat
Private
Replay Attack
DNS Log
11. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Shoulder Surfing
Hardware Attack
Cognitive biometrics
Boot
12. Using a single authentication credential that is shared across multiple networks.
Hash encoding
Identity management
DAC
Password
13. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Boot
Malicious Insiders
Zone transfer
Cipher locks
14. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Cyberterrorist
Cracker
Identification
Biometrics
15. Form of phishing that targets wealthy individuals.
Honeypot
ICMP Flood
Whaling
DMS (Demilitarized Zone)
16. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Prevention and detection
Password
Mouse Trapping
Stateful packet filtering
17. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Stateful packet filtering
ARP Poisoning
Honeypot
Electronic eavesdropping
18. Hides inside other software - usually as an attachment or a downloadable file
Private
Human memory
Challenge
Trojan-horse virus
19. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Subject
Trojan-horse virus
Rogue
Macro
20. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Information security
Three-Way Handshake
Federated identity management
Ciphertext
21. Ensures that messages are not corrupt or tampered with
Hash encoding
Port Scanner
Cognitive biometrics
Subject
22. A ____ virus infects the Master Boot Record of a hard disk drive.
Hoaxes
Boot
Electronic Vandal
Kerberos
23. A private key and public key
What is asymmetic encryption?
GIF Layering
Loop Protection
WEP (Wired Equivalent Privacy)
24. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Trojan-horse virus
Amart card
Virtualization
DNS Hijacking
25. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Role Based Access Control
RADIUS
Three-Way Handshake
Rogue
26. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Cognitive biometrics
DLP
Authentication request
ARP Poisoning
27. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Loop Protection
Smurf Attack
PAT
Distributed storage
28. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Spimming
Extreme temperatures
Denial of service attack
Shoulder Surfing
29. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
Spyware
Electronic Activist (hacktivist)
Kerberos
WEP (Wired Equivalent Privacy)
30. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
DNS Hijacking
Flashing
Authorization
Authentication request
31. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
White Hat
IEEE 802.1x
WEP (Wired Equivalent Privacy)
Scatternet
32. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Cipher locks
Mouse Trapping
Open Port
Clickjacking
33. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Internal Threat
Environmental Threat
Session hijacking
CHAP (Challenge Handshake Authentication Protocol)
34. Viruses and worms are said to be self-____.
Encryption
Virus
Replicating
Clickjacking
35. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Flashing
Internal Threat
DAC
Server-Side
36. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
Cyberbullying
Mantrap
Content inspection
37. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
Extreme temperatures
Environmental Threat
TCP/IP
Electronic eavesdropping
38. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Honeypot
Internal Threat
Replay
DMS (Demilitarized Zone)
39. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Bluesnarfing
DLP
RADIUS
Drive-by Download
40. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Man-made Threat
Chain
Wireless VLANs
41. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
CCTV
Insiders
Shoulder Surfing
Rogue
42. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
MPack
Packet tampering
BioMetric devices
Trojan-horse virus
43. The most restrictive access control model is ____.
TACACS
Mandatory Access Control
Standard biometrics
Black Hat
44. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
Bluejacking
Backup scope
Encryption
45. Can be used to determine whether new IP addresses are attempting to probe the network.
ACL (Access Control List)
DNS poisoning
Firewall logs
Adware
46. Often used for managing user access to one or more systems.
Content filtering
Internal Threat
Cloud computing
Rule Based Access Control
47. A user under Role Based Access Control can be assigned only one ____.
Macro
Role
Cognitive biometrics
Ciphertext
48. A firewall capable of monitoring a data stream from end to end.
Script Kiddie
Cyberstalking/Harassment
Stateful Firewall
Man-made Threat
49. Computer crimes involving the theft of money
Black Hat
MPack
Cyber Theft
White Hat
50. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
OAuth
Flaming
Brute Force
Federated identity management
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests