SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pretending to be another person.
Three-Way Handshake
Impersonation
MPack
IEEE 802.1x
2. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o
CHAP (Challenge Handshake Authentication Protocol)
Kerberos
Adware
Extreme Humidity
3. A ____ means that the application or service assigned to that port is listening for any instructions.
Open Port
Content inspection
Worm
Electronic eavesdropping
4. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
WEP (Wired Equivalent Privacy)
Mouse Trapping
Man-in-the-Middle Attack
Rainbow Tables
5. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Standard biometrics
Hardware Attack
Cyberbullying
MPack
6. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Spear Phishing
Bluejacking
Man-made Threat
Replay Attack
7. Broadcast storms can be prevented with ____.
Port Scanner
White box
Loop Protection
Extreme temperatures
8. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Swiss Cheese
Adware
computer footprint
DNS Hijacking
9. Set of rules that allow or deny traffic
Packet filtering
War Driving
WEP (Wired Equivalent Privacy)
Internal Threat
10. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Eavesdropping Attack
Rule Based Access Control
Load balancing
Association request
11. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
Security
Distributed storage
Shoulder Surfing
Flaming
12. People very knowledgeable about computers who use their knowledge to invade other people's computers
Cracker
Association request
Hacker
Dwell Time
13. Content filtering - encryption - firewalls
computer footprint
Rainbow Tables
Social engineering
Prevention and detection
14. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network
Firewalls
LEAP
Replay
Packet filtering
15. ____ attacks are responsible for half of all malware delivered by Web advertising.
Fake Antivirus
Load balancing
SYN Flood
Spear Phishing
16. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
DNS
Mantrap
Cyberbullying
CCTV
17. Computer crimes involving the theft of money
War Driving
Cyber Theft
History
Cognitive biometrics
18. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)
Virus
Malicious code
Identity management
Cognitive biometrics
19. The process of giving someone permission to do or have something
Authorization
Subject
Stateless Firewall
Open Port
20. Password and BioMetric
Two factor security
Backup scope
Tailgating
Replicating
21. The time it takes for a key to be pressed and then released.
Dwell Time
Encryption
Cognitive biometrics
Hardware Attack
22. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.
computer footprint
Replicating
Character
DNS poisoning
23. Often used for managing user access to one or more systems.
Zone transfer
Identity management
Federated identity management
Rule Based Access Control
24. Provides a greater degree of security by implementing port-based authentication.
Password
IEEE 802.1x
Cloud computing
Ciphertext
25. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Authentication
Port Scanner
Shoulder Surfing
Federated identity management
26. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Man-made Threat
Spoofing
Eavesdropping Attack
Script Kiddie
27. An attacker motivated by the ideology to attack computer or infrastructure networks.
Backup frequency
Eavesdropping Attack
Router
Cyberterrorist
28. Sending high volumes of UDP requests to a target.
UDP Flood
Authentication request
Password
Firewalls
29. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
ARP Poisoning
Password
DAP
Eavesdropping Attack
30. The ____ model is the least restrictive.
DAC
Hardware Attack
Root
Honeynet
31. A variety of threats such as viruses - worms - and Trojan horses
Data
Protocol analyzer
Malicious code
Script Kiddie
32. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Symmetric encryption
Honeypot
Cracker
Malicious Insiders
33. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Scatternet
Two factor security
ACL (Access Control List)
Protocol analyzer
34. A framework for transporting authentication protocols instead of the authentication protocol itself.
Flaming
EAP
Internal Threat
Bluesnarfing
35. A ____ attack is similar to a passive man-in-the-middle attack.
Cracker
Root
Replay
Account expiration
36. A threat that originates from outside the company. (ex. power failure.)
DNS poisoning
External Threat
Evil Twin
WEP (Wired Equivalent Privacy)
37. A ____ virus infects the Master Boot Record of a hard disk drive.
Proximity reader
Boot
Token
TACACS
38. A security analysis of the transaction within its approved context.
Content inspection
Operation
Account expiration
Extreme Humidity
39. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Distributed storage
Replay Attack
Extreme temperatures
Resident
40. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
LEAP
Hybird
Human memory
Adware
41. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Biometrics
Orphaned
Man-made Threat
Data
42. Below 40% or above 50%
OAuth
Cyberterrorist
Open Port
Extreme Humidity
43. Small electronic devices that change user passwords automatically
Fencing
Packet tampering
Testing
Token
44. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Malicious Insiders
Dumpster Diving
Distributed storage
Replay Attack
45. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Electronic Vandal
Association request
Client_Hello
Brute Force Attack
46. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
TACACS
Packet tampering
ARP Poisoning
Content inspection
47. The action that is taken by the subject over the object is called a ____.
Operation
Trojan-horse virus
Phishing
Backup frequency
48. Software that can guess passwords
Worm
Password Crackers
Shoulder Surfing
DNS Log
49. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Whaling
Floor Guard
RADIUS
Server-Side
50. Lock - conduit - card key - video equipment - secured guard
Flashing
Phishing
Clickjacking
Physical security access control measures
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests