SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Wireless VLANs
Packet tampering
Brute Force
Cipher locks
2. Four interrelated aspects to _________:Access - data - infrastructure - computers
IEEE 802.1x
Password
Physical security
Dwell Time
3. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Cipher locks
Smurf Attack
Bluejacking
Drive-by Download
4. Below 40% or above 50%
Brute Force Attack
Extreme Humidity
Authentication request
What is asymmetic encryption?
5. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluesnarfing
Role Based Access Control
Black Hat
Bluejacking
6. The process of verifying that your backups actually work
Private
Testing
Speech recognition
Bluejacking
7. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Cyberstalking/Harassment
Content-Filtering Firewall
Ciphertext
Testing
8. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Trusted OS
SYN Flood
RADIUS
Firewalls
9. A ____ virus infects the Master Boot Record of a hard disk drive.
Human memory
Tailgating
Distributed
Boot
10. Software that can guess passwords
Electronic Activist (hacktivist)
Offline cracking
Password Crackers
Loop Protection
11. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
SSO
Separation of duties
Session hijacking
ACL (Access Control List)
12. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Identity Theft
Mandatory Access Control
Dumpster Diving
Content filtering
13. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
Swiss Cheese
Zone transfer
Security
14. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Bluesnarfing
Hoaxes
Private
Flashing
15. Password and BioMetric
Two factor security
Electronic Activist (hacktivist)
Information security
Firewalls
16. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Identity Theft
White box
Backup scope
Proximity reader
17. A group of piconets in which connections exist between different piconets is called a ____.
Spyware
Kerberos
Whaling
Scatternet
18. Content filtering - encryption - firewalls
Proximity reader
Prevention and detection
Phishing
Authorization
19. Form of phishing that targets wealthy individuals.
Three-Way Handshake
Evil Twin
Speech recognition
Whaling
20. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
computer footprint
Open Port
Distributed Denial of Service (DDoS)
Proximity reader
21. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Distributed storage
Spimming
GIF Layering
Role
22. Set of rules that allow or deny traffic
Packet filtering
Reverse proxy
RADIUS
Backup frequency
23. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Spyware
Sniffer
Authentication
Physical security
24. A method for confirming users' identities
DLP
Biometrics
Authentication
Cybercriminals
25. A ____ attack is similar to a passive man-in-the-middle attack.
Chain
Macro
Replay
Rogue
26. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Account expiration
Bluesnarfing
Word Splitting
Offline cracking
27. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Role Based Access Control
Tailgate sensors
Authentication request
Stateful packet filtering
28. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Authentication request
DNS
Physical security
Association request
29. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Identification
Operation
Floor Guard
Black Hat
30. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Flaming
Physical security
EAP
Roller barrier
31. Often used for managing user access to one or more systems.
Spimming
Zone transfer
Loop Protection
Rule Based Access Control
32. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Man-made Threat
Phishing
Challenge
Roller barrier
33. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Honeypot
Resident
Role Based Access Control
Sniffer
34. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Distributed
Association request
White Hat
Floor Guard
35. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Proximity reader
70
Reverse proxy
Wireless security
36. An attack that sends unsolicited messages to Bluetooth-enabled devices.
TCP/IP
Word Splitting
Bluejacking
Access Control
37. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
PAT
Port Scanner
Cracker
Bluejacking
38. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Electronic Vandal
Stateful Firewall
Script Kiddie
Electronic Activist (hacktivist)
39. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
GIF Layering
Prevention and detection
DNS
Script Kiddie
40. People very knowledgeable about computers who use their knowledge to invade other people's computers
Adware
White box
Hacker
Distributed
41. Web application attacks are considered ____ attacks.
Physical security
Open Port
Server-Side
LEAP
42. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Hacker
CardSpace
Smurf Attack
Private
43. A user accessing a computer system must present credentials or ____ when logging on to the system.
Cognitive biometrics
Identity Theft
Root
Identification
44. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Information security
DNS Log
Logic Bomb
DLP
45. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Virtualization
Mantrap
Cracker
OAuth
46. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
WEP (Wired Equivalent Privacy)
DNS
Swiss Cheese
Extreme temperatures
47. When organizations use software that filters content to prevent the transmission of unauthorized information
Chain
Encryption
Content filtering
RADIUS
48. When DNS servers exchange information among themselves it is known as a ____.
Zone transfer
External Threat
Ciphertext
Chain
49. ____ is an image spam that is divided into multiple images.
Whaling
Flashing
GIF Layering
DNS Log
50. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
DAP
Cyber Theft
Hardware Attack
Spoofing