SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Floor Guard
Authorization
Brute Force
Bluejacking
2. An AP that is set up by an attacker.
Packet filtering
Evil Twin
Firewall logs
Packet tampering
3. A form of filtering that blocks only sites specified as harmful.
70
Blacklisting Software
Virus
Cyberterrorist
4. The most restrictive access control model is ____.
IEEE 802.1x
Mandatory Access Control
Zone transfer
Spoofing
5. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Spimming
Backup frequency
Authentication request
Black Hat
6. A ____ virus infects the Master Boot Record of a hard disk drive.
Testing
Boot
Two factor security
Three-Way Handshake
7. How many past backups you keep - what you did on your machine etc.
History
Replay Attack
TACACS
Three-Way Handshake
8. Below 70 degrees or above 75 degrees
Standard biometrics
ACL
Extreme temperatures
Cyberterrorist
9. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Web security gateway
DMS (Demilitarized Zone)
Honeynet
Buffer Overflow
10. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Identity management
SSO
Man-in-the-Middle Attack
11. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.
Electronic Vandal
Denial of service attack
DNS poisoning
Distributed
12. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Firewalls
Bluejacking
Hash encoding
Hybird
13. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
Proximity reader
Authorization
Wireless VLANs
14. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
IEEE 802.1x
VPN
Shoulder Surfing
Man-made Threat
15. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Man-made Threat
Orphaned
Bluejacking
Rainbow Tables
16. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Shoulder Surfing
Hoaxes
ARP Poisoning
Server-Side
17. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
Hardware Attack
Testing
Trusted OS
Internal Threat
18. Indicates when an account is no longer active.
Boot
Account expiration
Chain
LDAP injection
19. Viruses and worms are said to be self-____.
Sniffer
Replicating
Content filtering
Backup scope
20. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Electronic Activist (hacktivist)
Virus
Subject
Script Kiddie
21. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Identity management
Spoofing
Hoaxes
Physical security
22. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
DNS poisoning
DNS Hijacking
DNS
BioMetric devices
23. A private key and public key
What is asymmetic encryption?
Password Crackers
Physical security access control measures
Swiss Cheese
24. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
Extreme temperatures
Hacker
Swiss Cheese
25. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Three-Way Handshake
Flashing
Mantrap
Trusted OS
26. ____ attacks are responsible for half of all malware delivered by Web advertising.
Macro
Replay Attack
Fake Antivirus
Client_Hello
27. Sifting through a company's garbage to find information to help break into their computers
Token
Buffer Overflow
Roller barrier
Dumpster Diving
28. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Rainbow Tables
Password
Ciphertext
Vishing
29. A set of permissions that are attached to an object.
Backup frequency
ACL
Role Based Access Control
Token
30. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
PAT
Bluejacking
MPack
WEP (Wired Equivalent Privacy)
31. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Spoofing
Cloud computing
Cybercriminals
MPack
32. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Internal Threat
Swiss Cheese
Eavesdropping Attack
Virus
33. The action that is taken by the subject over the object is called a ____.
Reverse proxy
Web security gateway
Authentication
Operation
34. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Authentication request
VPN
CCTV
Proximity reader
35. ____ is an image spam that is divided into multiple images.
Distributed storage
Identity management
Cognitive biometrics
GIF Layering
36. Pretending to be another person.
Word Splitting
Resident
Impersonation
Prevention and detection
37. ____ involves horizontally separating words - although it is still readable by the human eye.
Cracker
Word Splitting
ACL
Worm
38. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Virtualization
Eavesdropping Attack
Distributed storage
ICMP Flood
39. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Security
Encryption
Bluejacking
PAT
40. How secure the data in your backups is-can use physical security or encryption
Role Based Access Control
Encryption
Security
ACL (Access Control List)
41. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Environmental Threat
Brute Force Attack
Cyberbullying
Protocol analyzer
42. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
Rootkit
computer footprint
Honeypot
Web security gateway
43. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
NAT
RADIUS
CCTV
70
44. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Spimming
SSO
Replay
DLP
45. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Port Scanner
Malicious Insiders
Server-Side
Distributed storage
46. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
Chain
Content filtering
Rogue
War Driving
47. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Macro
Distributed storage
Content inspection
Virtualization
48. Scrambles information into an alternative form that requires a key or password to decrypt the information
Encryption
Operation
Standard biometrics
Virtualization
49. Password and BioMetric
Physical security
Two factor security
Natural Threat
Wireless security
50. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Private
LDAP injection
Man-in-the-Middle Attack
Distributed storage
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests