SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wants to cause as much damage as possible - without a particular target or goal.
Adware
Electronic Vandal
Backup frequency
Hardware Attack
2. A framework for transporting authentication protocols instead of the authentication protocol itself.
Private
Dwell Time
EAP
Firewalls
3. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Private
Authentication
Vishing
Access Control
4. A commonly used technique by pornography sites where a user gets "locked" in a web site.
TACACS
Shoulder Surfing
Mouse Trapping
Buffer Overflow
5. A secret combination of letters - numbers - and/or characters that only the user should know.
Logic Bomb
Social engineering
Password
Separation of duties
6. It is able to code and decode data
Authentication request
LEAP
Data
Symmetric encryption
7. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Role
SSO
Firewalls
ICMP Flood
8. ____ is an image spam that is divided into multiple images.
Fake Antivirus
GIF Layering
Content filtering
Buffer Overflow
9. A ____ is designed to separate a nonsecured area from a secured area.
ACL
PAT
Mantrap
Locking Cabinets
10. Fingerprints and patterns
BioMetric devices
Electronic Vandal
Black Hat
Spear Phishing
11. The most restrictive access control model is ____.
Mandatory Access Control
Speech recognition
UDP Flood
Wireless VLANs
12. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
DLP
Port Scanner
Word Splitting
Identity management
13. A means of managing and presenting computer resources by function without regard to their physical layout or location.
DNS poisoning
Virtualization
Two factor security
Replay
14. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Vishing
Bluesnarfing
Cognitive biometrics
Port Scanner
15. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Association request
DMS (Demilitarized Zone)
Packet filtering
Vishing
16. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Prevention and detection
Dwell Time
Rogue
Honeynet
17. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.
Association request
DNS poisoning
DNS
Web security gateway
18. A firewall that can block designated types of traffic from entering a protected network.
Geometric variance
Packet tampering
OAuth
Content-Filtering Firewall
19. Four interrelated aspects to _________:Access - data - infrastructure - computers
Cybercriminals
Physical security
Buffer Overflow
Cloud computing
20. The ____ model is the least restrictive.
Root
Session hijacking
70
DAC
21. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Backup frequency
TACACS
Denial of service attack
Digital Certificate
22. A set of permissions that are attached to an object.
ACL
Password
Geometric variance
70
23. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Separation of duties
Router
Subject
Bluejacking
24. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Resident
70
Flaming
Spoofing
25. Scrambles information into an alternative form that requires a key or password to decrypt the information
Load balancing
Firewall logs
Encryption
CCTV
26. Broadcast storms can be prevented with ____.
Dwell Time
Loop Protection
DMS (Demilitarized Zone)
Packet tampering
27. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
UDP Flood
Script Kiddie
Physical security access control measures
Locking Cabinets
28. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Word Splitting
Roller barrier
DNS
Vishing
29. Below 40% or above 50%
BioMetric devices
Extreme Humidity
Brute Force Attack
Hash encoding
30. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
PAT
Biometrics
Packet tampering
What is asymmetic encryption?
31. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Prevention and detection
Rogue
Data
Authorization
32. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Black Hat
Spoofing
Access Control
Human memory
33. It accepts spoken words for input as if they had been typed on the keyboard.
CHAP (Challenge Handshake Authentication Protocol)
Roller barrier
Speech recognition
SSO
34. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Brute Force Attack
DNS Hijacking
Kerberos
Protocol analyzer
35. Requires mutual authentication used for WLAN encryption using Cisco client software.
LEAP
GIF Layering
Extreme temperatures
Information security
36. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluesnarfing
Flaming
Bluejacking
Role Based Access Control
37. Form of phishing that targets wealthy individuals.
Physical security access control measures
Open Port
Whaling
Brute Force Attack
38. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Adware
Rule Based Access Control
TACACS
Insiders
39. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Replay
Boot
Electronic Activist (hacktivist)
Physical security access control measures
40. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
ACL (Access Control List)
CCTV
Electronic Vandal
Shoulder Surfing
41. An AP that is set up by an attacker.
Symmetric encryption
Evil Twin
Cyberstalking/Harassment
Trojan-horse virus
42. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Server-Side
Logic Bomb
Authentication
Spyware
43. Web application attacks are considered ____ attacks.
Server-Side
Backup frequency
Replicating
Shoulder Surfing
44. ____ attacks are responsible for half of all malware delivered by Web advertising.
Virus
VPN
Fake Antivirus
Password
45. A threat that originates from outside the company. (ex. power failure.)
SYN Flood
External Threat
Scatternet
Insiders
46. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Role Based Access Control
Media for backups
Testing
UDP Flood
47. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Environmental Threat
Resident
Client_Hello
Smurf Attack
48. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Biometrics
Distributed Denial of Service (DDoS)
Content-Filtering Firewall
Shoulder Surfing
49. The process of giving someone permission to do or have something
Token
History
Authorization
Distributed
50. A ____ means that the application or service assigned to that port is listening for any instructions.
Role Based Access Control
Internal Threat
Open Port
White Hat