SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To create a rainbow table - each ____ begins with an initial password that is encrypted.
BioMetric devices
Electronic eavesdropping
Chain
Challenge
2. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Electronic Vandal
Floor Guard
Media for backups
Distributed
3. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.
Script Kiddie
Electronic eavesdropping
CardSpace
Hacker
4. Broadcast storms can be prevented with ____.
Rogue
Content filtering
Loop Protection
Distributed Denial of Service (DDoS)
5. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Replay Attack
Digital Certificate
Hardware Attack
Social engineering
6. Provides a greater degree of security by implementing port-based authentication.
Man-made Threat
Whaling
IEEE 802.1x
Black Hat
7. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Hardware Attack
Rainbow Tables
Ciphertext
DAP
8. Holds the promise of reducing the number of usernames and passwords that users must memorize.
SSO
NAT
ACL
Internal Threat
9. How secure the data in your backups is-can use physical security or encryption
Flashing
Security
Proximity reader
Replicating
10. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Subject
Bluejacking
Cyberterrorist
Dwell Time
11. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Drive-by Download
What is asymmetic encryption?
Reverse proxy
Eavesdropping Attack
12. ____ involves horizontally separating words - although it is still readable by the human eye.
Router
Kerberos
Spear Phishing
Word Splitting
13. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Distributed Denial of Service (DDoS)
Replay Attack
Smurf Attack
Standard biometrics
14. A technique that allows private IP addresses to be used on the public Internet.
Rainbow Tables
NAT
Content inspection
Blacklisting Software
15. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
What is asymmetic encryption?
Word Splitting
Prevention and detection
Cracker
16. A ____ means that the application or service assigned to that port is listening for any instructions.
Cracker
MPack
Open Port
Drive-by Download
17. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
Password
TACACS
Firewalls
18. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Cyber Theft
Loop Protection
Insiders
War Driving
19. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Ciphertext
Electronic eavesdropping
Operation
Virtualization
20. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.
Challenge
EAP
Trusted OS
Fake Antivirus
21. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Honeynet
Social engineering
Environmental Threat
Brute Force Attack
22. Users who access a Web server are usually restricted to the ____ directory.
White box
Spoofing
Root
Identification
23. Lock - conduit - card key - video equipment - secured guard
Shoulder Surfing
Authorization
Physical security access control measures
Protocol analyzer
24. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
OAuth
Account expiration
Virus
Cyberbullying
25. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
70
Private
Brute Force Attack
Content filtering
26. The action that is taken by the subject over the object is called a ____.
Hash encoding
Subject
Operation
Cyberterrorist
27. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Character
Human memory
Authentication request
Natural Threat
28. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Stateless Firewall
Backup frequency
Information security
Scatternet
29. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.
Clickjacking
Role Based Access Control
Roller barrier
White box
30. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
Identity Theft
TACACS
Encryption
31. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Access Control
ICMP Flood
Replay
Identity Theft
32. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
OAuth
Packet filtering
Distributed storage
70
33. Related to the perception - thought process - and understanding of the user.
Identity management
RADIUS
Role
Cognitive biometrics
34. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Role
Authentication request
DNS
Character
35. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Distributed
Roller barrier
Denial of service attack
DMS (Demilitarized Zone)
36. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
DNS Log
70
Malicious Insiders
DNS
37. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Cyberterrorist
Natural Threat
Denial of service attack
Testing
38. How often you perform your backups (cost-benefit analysis of backing up)
Challenge
Wireless security
Backup frequency
Internal Threat
39. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Authorization
Tailgate sensors
Password
Distributed storage
40. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
Whaling
WEP (Wired Equivalent Privacy)
Hoaxes
41. An attacker motivated by the ideology to attack computer or infrastructure networks.
OAuth
Cyberterrorist
Replay Attack
PAT
42. A security analysis of the transaction within its approved context.
Association request
DMS (Demilitarized Zone)
Content inspection
Dwell Time
43. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Rule Based Access Control
Stateless Firewall
Client_Hello
ARP Poisoning
44. A user under Role Based Access Control can be assigned only one ____.
Cognitive biometrics
Authorization
Role
UDP Flood
45. The time it takes for a key to be pressed and then released.
Geometric variance
Dwell Time
Fencing
Impersonation
46. Can also capture transmissions that contain passwords.
Content-Filtering Firewall
Protocol analyzer
Denial of service attack
Password Crackers
47. The process of verifying that your backups actually work
Authentication
Testing
Web security gateway
Hash encoding
48. A user accessing a computer system must present credentials or ____ when logging on to the system.
Phishing
Identification
ARP Poisoning
Replay
49. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Testing
Firewalls
Environmental Threat
Smurf Attack
50. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
History
Authorization
Macro
White Hat
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests