SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Rainbow Tables
Packet tampering
Client_Hello
Man-in-the-Middle Attack
2. A framework for transporting authentication protocols instead of the authentication protocol itself.
Resident
Electronic eavesdropping
Electronic Vandal
EAP
3. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Cyberstalking/Harassment
Script Kiddie
Kerberos
Adware
4. ____ can be prewired for electrical power as well as wired network connections.
Cognitive biometrics
Locking Cabinets
Fake Antivirus
Electronic eavesdropping
5. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
DNS
WEP (Wired Equivalent Privacy)
Stateless Firewall
Buffer Overflow
6. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Biometrics
What is asymmetic encryption?
Cracker
Brute Force
7. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Firewall logs
Smurf Attack
OAuth
Flashing
8. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Honeypot
Scatternet
Firewalls
Fake Antivirus
9. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Cyberstalking/Harassment
Trusted OS
Malicious Insiders
Extreme Humidity
10. Sifting through a company's garbage to find information to help break into their computers
Dumpster Diving
Dwell Time
Ciphertext
Replay
11. Fingerprints and patterns
Loop Protection
BioMetric devices
Electronic Activist (hacktivist)
Identity management
12. Due to the limitations of online guessing - most password attacks today use ____.
Bluejacking
Character
Offline cracking
Bluesnarfing
13. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Subject
Script Kiddie
Backup frequency
Stateless Firewall
14. Scrambles information into an alternative form that requires a key or password to decrypt the information
Stateful Firewall
Load balancing
Cracker
Encryption
15. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
Federated identity management
Bluesnarfing
DNS Hijacking
Malicious Insiders
16. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Media for backups
Cyberstalking/Harassment
Cloud computing
17. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Standard biometrics
Electronic eavesdropping
MPack
OAuth
18. A firewall that can block designated types of traffic from entering a protected network.
Whaling
Password Crackers
Replicating
Content-Filtering Firewall
19. The process of giving someone permission to do or have something
Black Hat
Load balancing
Smurf Attack
Authorization
20. Using a single authentication credential that is shared across multiple networks.
CHAP (Challenge Handshake Authentication Protocol)
Identity management
DNS
Bluesnarfing
21. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Packet tampering
Man-made Threat
EAP
SYN Flood
22. Web application attacks are considered ____ attacks.
Testing
Server-Side
Spear Phishing
Bluejacking
23. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Router
Information security
Account expiration
Packet filtering
24. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Session hijacking
Bluesnarfing
War Driving
Packet tampering
25. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Virus
Logic Bomb
computer footprint
DLP
26. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.
Router
Load balancing
War Driving
Session hijacking
27. Password and BioMetric
Firewall logs
Two factor security
SSO
Man-made Threat
28. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.
Spoofing
Amart card
Media for backups
Evil Twin
29. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Session hijacking
Malicious code
Wireless security
Resident
30. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Ciphertext
White box
BioMetric devices
Stateless Firewall
31. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
ICMP Flood
Drive-by Download
Distributed
Hoaxes
32. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing
Identity Theft
Amart card
Electronic Vandal
Authorization
33. Four interrelated aspects to _________:Access - data - infrastructure - computers
Rule Based Access Control
Physical security
Swiss Cheese
Flashing
34. A method for confirming users' identities
Port Scanner
Honeypot
Federated identity management
Authentication
35. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
Packet tampering
Subject
Dumpster Diving
Denial of service attack
36. How many past backups you keep - what you did on your machine etc.
Trojan-horse virus
Black Hat
History
Hash encoding
37. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
DAP
Floor Guard
Trusted OS
GIF Layering
38. These attacks may allow an attacker to construct LDAP statements based on user input statements.
What is asymmetic encryption?
LDAP injection
CHAP (Challenge Handshake Authentication Protocol)
Web security gateway
39. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Black Hat
Sniffer
DAC
Smurf Attack
40. Can create entries in a log for all queries that are received.
Fencing
DNS Log
ICMP Flood
CHAP (Challenge Handshake Authentication Protocol)
41. A security analysis of the transaction within its approved context.
Tailgate sensors
Packet tampering
Flashing
Content inspection
42. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Spoofing
Media for backups
Web security gateway
Dumpster Diving
43. A pay-per-use computing model in which customers pay only for the computing resources they need.
Whaling
Cloud computing
Flashing
Offline cracking
44. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Cyber Theft
Offline cracking
Wireless VLANs
White Hat
45. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
CCTV
Web security gateway
Port Scanner
TCP/IP
46. Set of rules that allow or deny traffic
Cognitive biometrics
Packet filtering
Flaming
Honeypot
47. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Phishing
Client_Hello
Firewall logs
Geometric variance
48. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Firewall logs
Distributed storage
Malicious Insiders
RADIUS
49. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Password Crackers
Fencing
Data
OAuth
50. A ____ encrypts all data that is transmitted between the remote device and the network.
Role Based Access Control
Bluejacking
Cyberbullying
VPN
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests