SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Below 70 degrees or above 75 degrees
Server-Side
Role
Router
Extreme temperatures
2. Lock - conduit - card key - video equipment - secured guard
Eavesdropping Attack
Physical security access control measures
Prevention and detection
Content filtering
3. The act of driving while running a laptop configured to detect and capture wireless data transmissions.
War Driving
Fencing
DNS Hijacking
Man-in-the-Middle Attack
4. Can be used to determine whether new IP addresses are attempting to probe the network.
Roller barrier
Firewall logs
Authentication
Identification
5. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Access Control
Stateful packet filtering
DAP
DNS
6. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Trusted OS
Smurf Attack
Trojan-horse virus
Orphaned
7. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Token
Sniffer
Flashing
Cyberbullying
8. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.
Bluesnarfing
Rootkit
Amart card
Data
9. The ____ model is the least restrictive.
ARP Poisoning
DAC
Environmental Threat
CCTV
10. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
Man-made Threat
PAT
Password
SYN Flood
11. Securing a restricted area by erecting a barrier is called ____.
Vishing
Fencing
Swiss Cheese
Hacker
12. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Cybercriminals
Operation
Adware
Cyberbullying
13. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e
Boot
computer footprint
MPack
Client_Hello
14. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.
Cognitive biometrics
Cipher locks
White Hat
LDAP injection
15. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.
Association request
LEAP
Bluejacking
Flaming
16. Allows a single access point to service different types of users.
Spyware
Wireless VLANs
Client_Hello
Operation
17. A secret combination of letters - numbers - and/or characters that only the user should know.
Role Based Access Control
Human memory
Password
Buffer Overflow
18. A ____ virus infects the Master Boot Record of a hard disk drive.
Impersonation
Boot
Rogue
Rule Based Access Control
19. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Spimming
Server-Side
Phishing
Separation of duties
20. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Rule Based Access Control
Authentication request
External Threat
Session hijacking
21. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
DNS poisoning
Digital Certificate
ARP Poisoning
Insiders
22. A program that is automatically downloaded to your computer without your consent or even your knowledge.
BioMetric devices
Electronic eavesdropping
Drive-by Download
Bluesnarfing
23. To create a rainbow table - each ____ begins with an initial password that is encrypted.
DNS
Chain
ACL
Script Kiddie
24. Form of phishing that targets wealthy individuals.
Whaling
Cloud computing
Bluesnarfing
Reverse proxy
25. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Speech recognition
Tailgate sensors
Challenge
Zone transfer
26. How secure the data in your backups is-can use physical security or encryption
Impersonation
Federated identity management
SYN Flood
Security
27. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
DLP
DNS Hijacking
Cyberstalking/Harassment
Malicious code
28. These accounts are user accounts that remain active after an employee has left an organization.
Human memory
Orphaned
EAP
Testing
29. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
Spyware
Cracker
Swiss Cheese
Distributed storage
30. When organizations use software that filters content to prevent the transmission of unauthorized information
Authorization
Content filtering
Man-in-the-Middle Attack
TACACS
31. A pay-per-use computing model in which customers pay only for the computing resources they need.
Separation of duties
Denial of service attack
Cloud computing
Sniffer
32. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.
Replay
Worm
Shoulder Surfing
Bluejacking
33. A ____ attack is similar to a passive man-in-the-middle attack.
Separation of duties
Drive-by Download
Replay
Backup frequency
34. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Macro
Cracker
Packet tampering
Hardware Attack
35. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
CHAP (Challenge Handshake Authentication Protocol)
Loop Protection
Bluesnarfing
Cybercriminals
36. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
70
ACL (Access Control List)
Server-Side
37. The geographical storage of your backups-safest place is a different place from where you keep your actual data
70
Insiders
Bluesnarfing
Distributed storage
38. A method for confirming users' identities
Hardware Attack
Operation
Open Port
Authentication
39. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.
Cyberstalking/Harassment
CCTV
DNS Hijacking
Federated identity management
40. Could become a key element in authentication in the future.
Cognitive biometrics
Geometric variance
Hardware Attack
Password Crackers
41. Ensures that messages are not corrupt or tampered with
Hash encoding
Dumpster Diving
Trusted OS
LDAP injection
42. Requires mutual authentication used for WLAN encryption using Cisco client software.
LEAP
Insiders
Bluejacking
Bluesnarfing
43. A group of piconets in which connections exist between different piconets is called a ____.
computer footprint
Scatternet
Replay Attack
Server-Side
44. Wants to cause as much damage as possible - without a particular target or goal.
Media for backups
Resident
Impersonation
Electronic Vandal
45. Forwards packets across computer networks.
Content filtering
Router
Firewall logs
Natural Threat
46. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Sniffer
Role Based Access Control
Physical security
Man-in-the-Middle Attack
47. It accepts spoken words for input as if they had been typed on the keyboard.
Cracker
Federated identity management
DMS (Demilitarized Zone)
Speech recognition
48. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
NAT
CardSpace
Flaming
Eavesdropping Attack
49. The process of giving someone permission to do or have something
Resident
Authorization
Content inspection
Identity management
50. An attacker motivated by the ideology to attack computer or infrastructure networks.
Content inspection
BioMetric devices
Rootkit
Cyberterrorist