SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Character
Adware
NAT
Content filtering
2. These accounts are user accounts that remain active after an employee has left an organization.
Bluejacking
Token
Orphaned
Evil Twin
3. A ____ encrypts all data that is transmitted between the remote device and the network.
History
VPN
Locking Cabinets
Character
4. Wants to cause as much damage as possible - without a particular target or goal.
Honeypot
Hardware Attack
Insiders
Electronic Vandal
5. Forwards packets across computer networks.
Kerberos
computer footprint
Router
DNS Hijacking
6. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
computer footprint
SYN Flood
Backup scope
WEP (Wired Equivalent Privacy)
7. Web application attacks are considered ____ attacks.
Digital Certificate
DNS Hijacking
OAuth
Server-Side
8. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Logic Bomb
Macro
EAP
Insiders
9. ____ is an image spam that is divided into multiple images.
Content filtering
Spyware
GIF Layering
Replay Attack
10. Form of phishing that targets wealthy individuals.
Whaling
Tailgating
Denial of service attack
Amart card
11. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
Macro
Content-Filtering Firewall
Backup scope
12. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Cybercriminals
Physical security
ACL (Access Control List)
White Hat
13. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Flashing
Electronic Activist (hacktivist)
DAC
Black Hat
14. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Rule Based Access Control
Encryption
Script Kiddie
CHAP (Challenge Handshake Authentication Protocol)
15. Content filtering - encryption - firewalls
Trusted OS
Stateful packet filtering
Password Crackers
Prevention and detection
16. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
CardSpace
Prevention and detection
Black Hat
Client_Hello
17. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
White Hat
Vishing
TCP/IP
Malicious code
18. A technique for crashing by sending too much data to the buffer in a comuter's memory
DNS Log
Three-Way Handshake
Buffer Overflow
Mantrap
19. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Security
Speech recognition
Buffer Overflow
Bluejacking
20. A ____ is designed to separate a nonsecured area from a secured area.
Amart card
Mantrap
Stateful Firewall
LDAP injection
21. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
Rainbow Tables
Proximity reader
LDAP injection
22. Computer crimes involving the theft of money
Cybercriminals
Cyber Theft
Standard biometrics
Hash encoding
23. Below 40% or above 50%
Malicious code
Mantrap
White Hat
Extreme Humidity
24. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
PAT
NAT
Testing
Shoulder Surfing
25. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Rainbow Tables
Identity Theft
SYN Flood
Locking Cabinets
26. An attacker motivated by the ideology to attack computer or infrastructure networks.
Social engineering
Port Scanner
Cyberterrorist
War Driving
27. A security analysis of the transaction within its approved context.
Hash encoding
Reverse proxy
Content inspection
OAuth
28. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
ACL
Rootkit
Role Based Access Control
Flaming
29. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
TACACS
DNS Hijacking
Malicious Insiders
Electronic Vandal
30. Fingerprints and patterns
BioMetric devices
Account expiration
Offline cracking
TCP/IP
31. The most restrictive access control model is ____.
Mandatory Access Control
Access Control
DLP
Account expiration
32. A secret combination of letters - numbers - and/or characters that only the user should know.
Password
Association request
Cracker
Locking Cabinets
33. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Symmetric encryption
Client_Hello
Swiss Cheese
Worm
34. Sending high volumes of UDP requests to a target.
Federated identity management
Spimming
UDP Flood
OAuth
35. Password and BioMetric
SSO
Two factor security
Hoaxes
Clickjacking
36. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Password Crackers
Logic Bomb
Rogue
37. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Bluejacking
Authentication request
Environmental Threat
TACACS
38. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Mandatory Access Control
Sniffer
Script Kiddie
Session hijacking
39. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Macro
Character
Packet filtering
Rogue
40. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Macro
Client_Hello
Spyware
History
41. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Extreme Humidity
Social engineering
Resident
Rootkit
42. Broadcast storms can be prevented with ____.
Loop Protection
SYN Flood
Cognitive biometrics
Blacklisting Software
43. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Fencing
Data
Mandatory Access Control
Challenge
44. When organizations use software that filters content to prevent the transmission of unauthorized information
Authentication
Spoofing
Honeynet
Content filtering
45. Software that can guess passwords
Script Kiddie
Open Port
Role
Password Crackers
46. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
White box
Buffer Overflow
Trojan-horse virus
OAuth
47. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Association request
Standard biometrics
Client_Hello
CCTV
48. Scrambles information into an alternative form that requires a key or password to decrypt the information
Subject
Encryption
Mantrap
Backup frequency
49. It is able to code and decode data
LEAP
Symmetric encryption
Password
IEEE 802.1x
50. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Replay
Client_Hello
Flashing
Chain