SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An authentication process that involves three steps.
Content filtering
Three-Way Handshake
Rule Based Access Control
Cognitive biometrics
2. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
DLP
Content inspection
WEP (Wired Equivalent Privacy)
Tailgating
3. When organizations use software that filters content to prevent the transmission of unauthorized information
Content filtering
Insiders
Whaling
Web security gateway
4. Provides a greater degree of security by implementing port-based authentication.
Denial of service attack
Protocol analyzer
Distributed storage
IEEE 802.1x
5. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
Trojan-horse virus
History
LEAP
Spimming
6. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Hoaxes
ACL
Information security
Social engineering
7. People very knowledgeable about computers who use their knowledge to invade other people's computers
Biometrics
UDP Flood
Hacker
Encryption
8. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.
SYN Flood
Social engineering
Drive-by Download
Natural Threat
9. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Virus
Mandatory Access Control
Amart card
Role Based Access Control
10. Indicates when an account is no longer active.
Account expiration
Cyberstalking/Harassment
DLP
Trusted OS
11. An attack that forces a user to unintentionally click a link.
Stateless Firewall
Clickjacking
Wireless security
Backup frequency
12. A security analysis of the transaction within its approved context.
Content inspection
Hacker
Authentication request
Backup scope
13. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Rainbow Tables
Man-in-the-Middle Attack
Biometrics
Media for backups
14. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Natural Threat
Script Kiddie
CHAP (Challenge Handshake Authentication Protocol)
Hash encoding
15. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
IEEE 802.1x
Cracker
Separation of duties
Firewall logs
16. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.
Symmetric encryption
Cipher locks
Information security
Macro
17. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae
Content inspection
Fake Antivirus
Smurf Attack
Wireless security
18. The process of giving someone permission to do or have something
Kerberos
Offline cracking
Authorization
Insiders
19. Floods a Web site with so many requests for service that it slows down or crashes the site
Denial of service attack
Physical security
Subject
Rainbow Tables
20. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Phishing
Environmental Threat
Firewalls
Prevention and detection
21. Sending high volumes of ICMP (usually ping) packets to a target.
Worm
War Driving
ICMP Flood
Content filtering
22. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Honeypot
Brute Force
Malicious Insiders
Blacklisting Software
23. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
TCP/IP
Server-Side
Rootkit
Hacker
24. Scrambles information into an alternative form that requires a key or password to decrypt the information
Extreme temperatures
Encryption
Evil Twin
computer footprint
25. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
External Threat
Three-Way Handshake
Loop Protection
Internal Threat
26. A variety of threats such as viruses - worms - and Trojan horses
Malicious code
Electronic eavesdropping
Hoaxes
Prevention and detection
27. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Social engineering
Backup scope
Insiders
Access Control
28. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Content-Filtering Firewall
Distributed Denial of Service (DDoS)
NAT
Adware
29. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
External Threat
Spyware
TCP/IP
Evil Twin
30. A firewall capable of monitoring a data stream from end to end.
Identity management
Cloud computing
Stateless Firewall
Stateful Firewall
31. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
Operation
Backup scope
Distributed Denial of Service (DDoS)
BioMetric devices
32. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Identity Theft
Spoofing
Drive-by Download
Client_Hello
33. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Data
Man-in-the-Middle Attack
OAuth
Cognitive biometrics
34. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Token
CCTV
Web security gateway
White box
35. Securing a restricted area by erecting a barrier is called ____.
Worm
Fencing
Rainbow Tables
Cyberstalking/Harassment
36. Allows a single access point to service different types of users.
Wireless VLANs
Clickjacking
Bluejacking
Offline cracking
37. A pay-per-use computing model in which customers pay only for the computing resources they need.
Cloud computing
Identity Theft
Environmental Threat
Bluejacking
38. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
Electronic Activist (hacktivist)
Honeypot
Spyware
ACL (Access Control List)
39. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Virtualization
Packet filtering
Clickjacking
DAP
40. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Stateful packet filtering
Amart card
Brute Force Attack
Cyberbullying
41. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
70
Subject
Man-made Threat
LEAP
42. Four interrelated aspects to _________:Access - data - infrastructure - computers
Word Splitting
Association request
Physical security
Flashing
43. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Drive-by Download
Stateful packet filtering
Speech recognition
Environmental Threat
44. A method for confirming users' identities
Association request
Adware
Authentication
Kerberos
45. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
DNS Hijacking
Content inspection
Cyber Theft
46. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Proximity reader
Smurf Attack
Token
70
47. Ensures that messages are not corrupt or tampered with
Hash encoding
Extreme Humidity
DAC
Brute Force Attack
48. ____ is an image spam that is divided into multiple images.
Bluesnarfing
GIF Layering
Prevention and detection
Data
49. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Locking Cabinets
Authentication request
UDP Flood
RADIUS
50. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Role
Spimming
Distributed storage
Replay Attack