SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
70
Flashing
Electronic Activist (hacktivist)
Role Based Access Control
2. These attacks may allow an attacker to construct LDAP statements based on user input statements.
Speech recognition
LDAP injection
Electronic eavesdropping
Wireless VLANs
3. How many past backups you keep - what you did on your machine etc.
Loop Protection
Spimming
History
Firewalls
4. Hides inside other software - usually as an attachment or a downloadable file
Spoofing
Trojan-horse virus
Worm
Biometrics
5. The time it takes for a key to be pressed and then released.
White Hat
Internal Threat
OAuth
Dwell Time
6. These accounts are user accounts that remain active after an employee has left an organization.
Port Scanner
Orphaned
Phishing
Mantrap
7. A firewall capable of monitoring a data stream from end to end.
Evil Twin
Stateful Firewall
Spoofing
Packet filtering
8. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Clickjacking
CHAP (Challenge Handshake Authentication Protocol)
Cracker
Internal Threat
9. Requires mutual authentication used for WLAN encryption using Cisco client software.
Authentication
DAP
Flashing
LEAP
10. An attacker slips through a secure area following a legitimate employee.
WEP (Wired Equivalent Privacy)
Password Crackers
Rootkit
Tailgating
11. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Token
White box
Standard biometrics
Mantrap
12. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
Geometric variance
Extreme temperatures
Malicious code
Zone transfer
13. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Flashing
Cognitive biometrics
Floor Guard
Smurf Attack
14. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Virus
computer footprint
Role Based Access Control
History
15. Scrambles information into an alternative form that requires a key or password to decrypt the information
Zone transfer
Fencing
Encryption
Kerberos
16. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Rogue
Subject
Offline cracking
Standard biometrics
17. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Bluesnarfing
Port Scanner
Insiders
Router
18. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Macro
DNS
Replay
PAT
19. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Rainbow Tables
Data
What is asymmetic encryption?
Rule Based Access Control
20. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Brute Force Attack
DNS Log
CHAP (Challenge Handshake Authentication Protocol)
Orphaned
21. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Access Control
Honeynet
Floor Guard
Offline cracking
22. ____ can be prewired for electrical power as well as wired network connections.
Account expiration
Locking Cabinets
NAT
WEP (Wired Equivalent Privacy)
23. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Virus
Session hijacking
Electronic Vandal
Information security
24. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Authorization
Authentication request
Stateless Firewall
Tailgate sensors
25. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Wireless VLANs
Data
Worm
Cracker
26. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Kerberos
Separation of duties
Human memory
Packet tampering
27. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
CardSpace
Association request
Packet tampering
28. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Mandatory Access Control
Firewalls
Role
Router
29. Holds the promise of reducing the number of usernames and passwords that users must memorize.
SSO
Rootkit
Private
Distributed storage
30. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Flashing
Denial of service attack
ARP Poisoning
Flaming
31. Using a single authentication credential that is shared across multiple networks.
ICMP Flood
Client_Hello
Identity management
Internal Threat
32. A user under Role Based Access Control can be assigned only one ____.
Hash encoding
Rootkit
Role
Speech recognition
33. An authentication process that involves three steps.
Three-Way Handshake
Human memory
Rainbow Tables
Rule Based Access Control
34. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Identity Theft
Resident
Orphaned
TCP/IP
35. A private key and public key
Electronic Activist (hacktivist)
Social engineering
What is asymmetic encryption?
Word Splitting
36. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Cognitive biometrics
Standard biometrics
Port Scanner
Biometrics
37. It is able to code and decode data
VPN
Digital Certificate
Symmetric encryption
Eavesdropping Attack
38. A secret combination of letters - numbers - and/or characters that only the user should know.
Firewall logs
Bluesnarfing
Password
Virtualization
39. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
OAuth
Cognitive biometrics
Electronic eavesdropping
Proximity reader
40. An attacker motivated by the ideology to attack computer or infrastructure networks.
DNS
Flashing
Cyberterrorist
White box
41. A ____ attack is similar to a passive man-in-the-middle attack.
Swiss Cheese
Replay
Protocol analyzer
Rule Based Access Control
42. Hacker who exposes vulnerabilities for financial gain or malicious purpose.
Natural Threat
MPack
Black Hat
Honeynet
43. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Identity Theft
Character
Resident
Private
44. Can be used to determine whether new IP addresses are attempting to probe the network.
Firewall logs
Chain
Challenge
Authorization
45. A framework for transporting authentication protocols instead of the authentication protocol itself.
Fencing
Speech recognition
EAP
Packet tampering
46. The ____ model is the least restrictive.
DAC
Cognitive biometrics
Mouse Trapping
Malicious code
47. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
TACACS
Distributed
Black Hat
Protocol analyzer
48. A technique for crashing by sending too much data to the buffer in a comuter's memory
Firewalls
Zone transfer
Hacker
Buffer Overflow
49. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)
Backup scope
Password Crackers
CCTV
Brute Force Attack
50. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Proximity reader
Character
Shoulder Surfing
Client_Hello
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests