SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most restrictive access control model is ____.
Authentication request
Mandatory Access Control
DNS Log
DAP
2. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
ACL
Honeynet
Boot
Hybird
3. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
DNS poisoning
Prevention and detection
CHAP (Challenge Handshake Authentication Protocol)
4. These accounts are user accounts that remain active after an employee has left an organization.
Orphaned
Electronic Vandal
Identification
Replay
5. Below 40% or above 50%
Tailgate sensors
Trusted OS
Identification
Extreme Humidity
6. Floods a Web site with so many requests for service that it slows down or crashes the site
Mouse Trapping
Denial of service attack
Authentication request
Extreme Humidity
7. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Roller barrier
Association request
Swiss Cheese
Malicious Insiders
8. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Locking Cabinets
Script Kiddie
Phishing
Password Crackers
9. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Spyware
Packet filtering
Replay Attack
Extreme temperatures
10. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Replicating
Distributed Denial of Service (DDoS)
Environmental Threat
DNS Hijacking
11. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Wireless security
Wireless VLANs
Whaling
Amart card
12. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
Testing
History
Logic Bomb
13. Viruses and worms are said to be self-____.
Roller barrier
Replicating
ARP Poisoning
Cipher locks
14. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Testing
Vishing
RADIUS
Insiders
15. Allows a single access point to service different types of users.
Wireless security
Wireless VLANs
Whaling
Web security gateway
16. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Fake Antivirus
Honeypot
Man-in-the-Middle Attack
Mantrap
17. Set of rules that allow or deny traffic
History
Packet filtering
Tailgating
Bluesnarfing
18. Securing a restricted area by erecting a barrier is called ____.
Bluesnarfing
Reverse proxy
Trusted OS
Fencing
19. Can create entries in a log for all queries that are received.
Electronic eavesdropping
Replay Attack
Electronic Vandal
DNS Log
20. A technique for crashing by sending too much data to the buffer in a comuter's memory
DAP
Buffer Overflow
Geometric variance
Bluejacking
21. Wants to cause as much damage as possible - without a particular target or goal.
Electronic Vandal
Tailgate sensors
Extreme temperatures
Wireless security
22. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
SSO
Internal Threat
DNS
Virus
23. People very knowledgeable about computers who use their knowledge to invade other people's computers
Electronic Vandal
DNS Log
SSO
Hacker
24. Lock - conduit - card key - video equipment - secured guard
Content-Filtering Firewall
Bluejacking
Physical security access control measures
Natural Threat
25. A framework for transporting authentication protocols instead of the authentication protocol itself.
EAP
DNS
DAC
Hoaxes
26. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Sniffer
Black Hat
Rootkit
EAP
27. A private key and public key
Locking Cabinets
Hybird
Impersonation
What is asymmetic encryption?
28. The process of verifying that your backups actually work
Wireless VLANs
Root
Testing
Data
29. Using a single authentication credential that is shared across multiple networks.
Speech recognition
Identity management
Digital Certificate
Mouse Trapping
30. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Character
Replay Attack
Brute Force
Session hijacking
31. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
70
Biometrics
Distributed
CHAP (Challenge Handshake Authentication Protocol)
32. The protection of information from accidental or intentional misuse by persons inside or outside an organization
GIF Layering
Boot
Account expiration
Information security
33. When DNS servers exchange information among themselves it is known as a ____.
ICMP Flood
Zone transfer
Stateful Firewall
GIF Layering
34. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Federated identity management
Buffer Overflow
Honeypot
External Threat
35. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
TCP/IP
CCTV
ICMP Flood
Adware
36. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Smurf Attack
Black Hat
Rainbow Tables
Spoofing
37. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Drive-by Download
Brute Force
Script Kiddie
Replay
38. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Distributed Denial of Service (DDoS)
Symmetric encryption
Content-Filtering Firewall
39. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Firewalls
TACACS
Role Based Access Control
Mandatory Access Control
40. An attacker slips through a secure area following a legitimate employee.
Tailgating
History
DNS Log
Stateless Firewall
41. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Distributed Denial of Service (DDoS)
Honeynet
Rootkit
Sniffer
42. Pretending to be another person.
Password
Impersonation
Open Port
Man-in-the-Middle Attack
43. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Symmetric encryption
RADIUS
Electronic Activist (hacktivist)
DNS Log
44. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Stateless Firewall
Bluesnarfing
Chain
Protocol analyzer
45. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Virus
PAT
Client_Hello
Authentication
46. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Social engineering
Electronic eavesdropping
DNS poisoning
Tailgating
47. ____ is an image spam that is divided into multiple images.
Cyberbullying
Vishing
GIF Layering
Locking Cabinets
48. Often used for managing user access to one or more systems.
Rule Based Access Control
Mandatory Access Control
Buffer Overflow
Distributed
49. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Locking Cabinets
Content-Filtering Firewall
Kerberos
Resident
50. A firewall that can block designated types of traffic from entering a protected network.
Smurf Attack
Resident
Content-Filtering Firewall
Distributed Denial of Service (DDoS)