SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Identity Theft
UDP Flood
TCP/IP
Ciphertext
2. Fingerprints and patterns
Packet tampering
BioMetric devices
SSO
Worm
3. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
History
Stateless Firewall
Flashing
Phishing
4. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Rootkit
Bluesnarfing
Authorization
Role Based Access Control
5. Holds the promise of reducing the number of usernames and passwords that users must memorize.
SSO
Packet filtering
Mandatory Access Control
LDAP injection
6. Requires mutual authentication used for WLAN encryption using Cisco client software.
Proximity reader
Root
Operation
LEAP
7. These accounts are user accounts that remain active after an employee has left an organization.
Cyber Theft
Orphaned
DNS poisoning
Electronic Vandal
8. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Word Splitting
Federated identity management
Biometrics
Spyware
9. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Cognitive biometrics
Man-made Threat
Content filtering
Bluejacking
10. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Cyberterrorist
TACACS
Replay Attack
Authentication request
11. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Stateless Firewall
NAT
Hybird
Malicious Insiders
12. Related to the perception - thought process - and understanding of the user.
Cognitive biometrics
Tailgate sensors
Electronic Activist (hacktivist)
Content-Filtering Firewall
13. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Dwell Time
ACL (Access Control List)
Trojan-horse virus
SSO
14. A ____ is a network set up with intentional vulnerabilities.
Open Port
Role Based Access Control
Three-Way Handshake
Honeynet
15. An attacker slips through a secure area following a legitimate employee.
Physical security
Blacklisting Software
Tailgating
Dumpster Diving
16. Below 40% or above 50%
Federated identity management
Extreme Humidity
Biometrics
Character
17. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Physical security access control measures
Authorization
Firewall logs
Cybercriminals
18. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Backup scope
Sniffer
Cloud computing
What is asymmetic encryption?
19. The action that is taken by the subject over the object is called a ____.
Man-in-the-Middle Attack
Operation
Stateless Firewall
Backup scope
20. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Brute Force Attack
Packet filtering
Script Kiddie
Distributed
21. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Spoofing
CardSpace
War Driving
Biometrics
22. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
computer footprint
War Driving
Distributed Denial of Service (DDoS)
Adware
23. The most restrictive access control model is ____.
Mandatory Access Control
Malicious code
Hybird
Bluejacking
24. ____ can be prewired for electrical power as well as wired network connections.
Cyber Theft
Firewall logs
Smurf Attack
Locking Cabinets
25. Lock - conduit - card key - video equipment - secured guard
Swiss Cheese
Information security
Password Crackers
Physical security access control measures
26. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Malicious code
Extreme temperatures
Rule Based Access Control
27. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Client_Hello
Federated identity management
DMS (Demilitarized Zone)
Stateful packet filtering
28. It accepts spoken words for input as if they had been typed on the keyboard.
Impersonation
Scatternet
Speech recognition
Hybird
29. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Geometric variance
Cybercriminals
CardSpace
Macro
30. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Malicious code
Internal Threat
History
Association request
31. A threat that originates from outside the company. (ex. power failure.)
External Threat
Extreme temperatures
Dwell Time
Electronic eavesdropping
32. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Social engineering
DNS
Password Crackers
PAT
33. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
ICMP Flood
External Threat
Challenge
Distributed Denial of Service (DDoS)
34. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Authentication
Stateful packet filtering
Cyberbullying
White Hat
35. Scrambles information into an alternative form that requires a key or password to decrypt the information
Encryption
War Driving
Honeypot
Spyware
36. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Session hijacking
DMS (Demilitarized Zone)
Firewall logs
Man-made Threat
37. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Cipher locks
Subject
Reverse proxy
Data
38. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Token
Virus
White box
Ciphertext
39. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Media for backups
RADIUS
Replay
Spimming
40. A form of filtering that blocks only sites specified as harmful.
Human memory
Cyberbullying
Web security gateway
Blacklisting Software
41. Password and BioMetric
Two factor security
Content inspection
Logic Bomb
Wireless VLANs
42. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
ARP Poisoning
LEAP
Identification
Tailgating
43. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
PAT
Malicious Insiders
Man-in-the-Middle Attack
Bluesnarfing
44. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Operation
Kerberos
Evil Twin
CHAP (Challenge Handshake Authentication Protocol)
45. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Proximity reader
Content filtering
Electronic eavesdropping
Fencing
46. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Logic Bomb
Denial of service attack
Spoofing
Two factor security
47. The protection of information from accidental or intentional misuse by persons inside or outside an organization
CardSpace
Separation of duties
Information security
Rainbow Tables
48. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Bluesnarfing
Smurf Attack
Electronic Activist (hacktivist)
Drive-by Download
49. ____ attacks are responsible for half of all malware delivered by Web advertising.
Fake Antivirus
Macro
Sniffer
EAP
50. Using a single authentication credential that is shared across multiple networks.
Identity management
Offline cracking
Proximity reader
Protocol analyzer