SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Standard biometrics
Wireless VLANs
Authentication request
Flaming
2. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Adware
Hoaxes
White Hat
Cognitive biometrics
3. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Authorization
CCTV
Challenge
70
4. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Internal Threat
Drive-by Download
Hardware Attack
Bluejacking
5. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.
DNS Hijacking
Vishing
Spimming
Offline cracking
6. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
PAT
CCTV
Standard biometrics
Sniffer
7. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Honeypot
Replay Attack
Eavesdropping Attack
Cracker
8. A form of filtering that blocks only sites specified as harmful.
SYN Flood
Cipher locks
What is asymmetic encryption?
Blacklisting Software
9. Using a single authentication credential that is shared across multiple networks.
Media for backups
Flaming
Cracker
Identity management
10. The protection of information from accidental or intentional misuse by persons inside or outside an organization
Information security
EAP
Character
Kerberos
11. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>
Social engineering
Brute Force
Content-Filtering Firewall
Bluejacking
12. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
Offline cracking
DAP
CHAP (Challenge Handshake Authentication Protocol)
WEP (Wired Equivalent Privacy)
13. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
CHAP (Challenge Handshake Authentication Protocol)
Rootkit
Authentication request
Trojan-horse virus
14. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Stateless Firewall
Tailgating
DAC
Hacker
15. When DNS servers exchange information among themselves it is known as a ____.
Zone transfer
Rootkit
Trojan-horse virus
70
16. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
DNS Log
Data
Rootkit
Distributed Denial of Service (DDoS)
17. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Offline cracking
Information security
Natural Threat
Flashing
18. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Association request
Mantrap
Replay Attack
Spyware
19. An attacker motivated by the ideology to attack computer or infrastructure networks.
Cyberterrorist
Natural Threat
DNS Log
Cognitive biometrics
20. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Replay Attack
Roller barrier
Open Port
Swiss Cheese
21. Due to the limitations of online guessing - most password attacks today use ____.
Media for backups
Offline cracking
Locking Cabinets
Spear Phishing
22. It accepts spoken words for input as if they had been typed on the keyboard.
What is asymmetic encryption?
Load balancing
EAP
Speech recognition
23. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
DNS
White box
Man-made Threat
War Driving
24. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.
Cipher locks
Electronic eavesdropping
LDAP injection
Evil Twin
25. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Packet tampering
Hardware Attack
VPN
Virus
26. A variety of threats such as viruses - worms - and Trojan horses
Insiders
Malicious code
Honeynet
Two factor security
27. A firewall capable of monitoring a data stream from end to end.
Spoofing
Open Port
Subject
Stateful Firewall
28. A user accessing a computer system must present credentials or ____ when logging on to the system.
Flaming
Distributed Denial of Service (DDoS)
Identification
Impersonation
29. ____ is an image spam that is divided into multiple images.
Private
Spoofing
GIF Layering
Blacklisting Software
30. Computer crimes involving the theft of money
Cyber Theft
Subject
Brute Force
Man-in-the-Middle Attack
31. Fingerprints and patterns
Kerberos
Cyberbullying
Distributed storage
BioMetric devices
32. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
GIF Layering
Cybercriminals
Natural Threat
LEAP
33. Software that can guess passwords
Flashing
DNS
Password Crackers
Fencing
34. An AP that is set up by an attacker.
Bluesnarfing
Roller barrier
Evil Twin
Buffer Overflow
35. The geographical storage of your backups-safest place is a different place from where you keep your actual data
Hoaxes
Trusted OS
Distributed storage
Social engineering
36. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
BioMetric devices
Rainbow Tables
Cyberterrorist
Electronic Vandal
37. Securing a restricted area by erecting a barrier is called ____.
Symmetric encryption
Fencing
Bluesnarfing
Biometrics
38. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Insiders
Vishing
ACL
Distributed Denial of Service (DDoS)
39. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Proximity reader
Virus
Symmetric encryption
Authentication request
40. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)
Mantrap
Challenge
Media for backups
Black Hat
41. It is able to code and decode data
Content-Filtering Firewall
Symmetric encryption
Hoaxes
Buffer Overflow
42. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Physical security
White Hat
Flaming
Impersonation
43. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Subject
What is asymmetic encryption?
Cyber Theft
Insiders
44. A threat that originates from outside the company. (ex. power failure.)
Protocol analyzer
Cipher locks
White box
External Threat
45. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Zone transfer
EAP
Digital Certificate
Data
46. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
WEP (Wired Equivalent Privacy)
computer footprint
Standard biometrics
70
47. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Social engineering
LEAP
Zone transfer
Reverse proxy
48. A security analysis of the transaction within its approved context.
Replay
Role Based Access Control
Content inspection
Orphaned
49. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.
Standard biometrics
Floor Guard
Cybercriminals
Bluesnarfing
50. A ____ means that the application or service assigned to that port is listening for any instructions.
Operation
Open Port
Backup frequency
DAC
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests