SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Script Kiddie
Testing
Geometric variance
Flashing
2. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Stateless Firewall
Replay
Hash encoding
IEEE 802.1x
3. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Content-Filtering Firewall
Environmental Threat
ACL (Access Control List)
ICMP Flood
4. It is able to code and decode data
Identity Theft
TACACS
Hoaxes
Symmetric encryption
5. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Drive-by Download
DNS poisoning
DNS
CHAP (Challenge Handshake Authentication Protocol)
6. Set of rules that allow or deny traffic
MPack
VPN
Packet filtering
Extreme Humidity
7. A ____ attack is similar to a passive man-in-the-middle attack.
Replay
Packet tampering
Electronic Vandal
External Threat
8. The most restrictive access control model is ____.
Two factor security
Digital Certificate
Offline cracking
Mandatory Access Control
9. A secret combination of letters - numbers - and/or characters that only the user should know.
Sniffer
Password
Tailgating
Client_Hello
10. A threat that originates from outside the company. (ex. power failure.)
DNS poisoning
BioMetric devices
External Threat
Replicating
11. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Three-Way Handshake
Ciphertext
UDP Flood
Character
12. How many past backups you keep - what you did on your machine etc.
Session hijacking
History
Physical security
Blacklisting Software
13. Ensures that messages are not corrupt or tampered with
Mantrap
Hash encoding
Router
Loop Protection
14. Holds the promise of reducing the number of usernames and passwords that users must memorize.
TACACS
SSO
Tailgate sensors
LEAP
15. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Phishing
Wireless security
Man-made Threat
Protocol analyzer
16. Due to the limitations of online guessing - most password attacks today use ____.
Ciphertext
DAC
Offline cracking
Clickjacking
17. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Rootkit
Session hijacking
Biometrics
Worm
18. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
White box
Logic Bomb
Cipher locks
Flaming
19. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Bluesnarfing
Wireless security
Floor Guard
70
20. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Firewall logs
Account expiration
External Threat
Hardware Attack
21. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
CCTV
Amart card
70
Wireless security
22. A form of filtering that blocks only sites specified as harmful.
Blacklisting Software
Virus
Server-Side
Cloud computing
23. Below 70 degrees or above 75 degrees
Stateful packet filtering
Boot
Vishing
Extreme temperatures
24. Related to the perception - thought process - and understanding of the user.
Cognitive biometrics
ARP Poisoning
Human memory
Geometric variance
25. A firewall capable of monitoring a data stream from end to end.
Firewall logs
Symmetric encryption
Man-made Threat
Stateful Firewall
26. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Encryption
Evil Twin
Challenge
Standard biometrics
27. Small electronic devices that change user passwords automatically
Tailgate sensors
Password
Malicious code
Token
28. A variety of threats such as viruses - worms - and Trojan horses
PAT
Malicious code
Packet tampering
TACACS
29. A ____ means that the application or service assigned to that port is listening for any instructions.
Three-Way Handshake
Flaming
Zone transfer
Open Port
30. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Distributed Denial of Service (DDoS)
Eavesdropping Attack
Replay Attack
Character
31. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Black Hat
VPN
Packet filtering
Phishing
32. Securing a restricted area by erecting a barrier is called ____.
Loop Protection
Fencing
Association request
Load balancing
33. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
IEEE 802.1x
Tailgate sensors
Cracker
CardSpace
34. The weakness of passwords centers on ____.
Worm
Standard biometrics
Human memory
Locking Cabinets
35. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Cyberbullying
Authorization
MPack
Electronic Activist (hacktivist)
36. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Internal Threat
PAT
Electronic Vandal
DNS Hijacking
37. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Content inspection
SYN Flood
Locking Cabinets
Firewalls
38. A ____ is designed to separate a nonsecured area from a secured area.
Amart card
Mantrap
IEEE 802.1x
Backup frequency
39. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance
Cloud computing
Tailgating
Spyware
Vishing
40. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
Separation of duties
Cyber Theft
EAP
Roller barrier
41. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Federated identity management
Script Kiddie
Electronic eavesdropping
Data
42. When DNS servers exchange information among themselves it is known as a ____.
Bluejacking
Zone transfer
Cipher locks
Bluesnarfing
43. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
Replay Attack
Authentication
SYN Flood
Authorization
44. Allows a single access point to service different types of users.
Proximity reader
Wireless VLANs
Session hijacking
SYN Flood
45. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Identification
Zone transfer
Wireless VLANs
DNS poisoning
46. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Hoaxes
Bluesnarfing
DNS
Three-Way Handshake
47. Four interrelated aspects to _________:Access - data - infrastructure - computers
Distributed
Physical security
Router
RADIUS
48. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Packet tampering
Client_Hello
Password
Shoulder Surfing
49. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Replay Attack
ARP Poisoning
RADIUS
Cybercriminals
50. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Adware
Root
Hybird
Insiders
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests