SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Dwell Time
Hybird
Scatternet
UDP Flood
2. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services
History
DMS (Demilitarized Zone)
Flaming
White box
3. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.
Bluesnarfing
Man-in-the-Middle Attack
Flashing
Malicious Insiders
4. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
LDAP injection
Bluejacking
Sniffer
Tailgate sensors
5. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.
ACL (Access Control List)
Geometric variance
Subject
Dwell Time
6. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
70
Electronic eavesdropping
Physical security
Mantrap
7. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Password
Challenge
OAuth
Distributed
8. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Trojan-horse virus
Access Control
CCTV
Federated identity management
9. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Replay Attack
Packet filtering
Bluejacking
Internal Threat
10. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Dwell Time
Natural Threat
Replay Attack
Social engineering
11. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Boot
Man-in-the-Middle Attack
Zone transfer
Kerberos
12. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Insiders
Character
DNS poisoning
Brute Force Attack
13. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends
Hoaxes
Password
Identity Theft
Tailgate sensors
14. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
Open Port
Environmental Threat
Fake Antivirus
Cyberbullying
15. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.
Bluejacking
Brute Force
Authorization
Flashing
16. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.
Virtualization
Honeypot
Backup scope
Role
17. Holds the promise of reducing the number of usernames and passwords that users must memorize.
Drive-by Download
SSO
Identity Theft
Password Crackers
18. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Resident
CHAP (Challenge Handshake Authentication Protocol)
Password
What is asymmetic encryption?
19. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
VPN
WEP (Wired Equivalent Privacy)
Port Scanner
Stateful packet filtering
20. Floods a Web site with so many requests for service that it slows down or crashes the site
Bluesnarfing
Session hijacking
Resident
Denial of service attack
21. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Script Kiddie
TACACS
White box
Packet tampering
22. Below 40% or above 50%
Spyware
Extreme Humidity
Tailgate sensors
Environmental Threat
23. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Fencing
Replay Attack
Web security gateway
Floor Guard
24. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.
DLP
Swiss Cheese
Operation
Drive-by Download
25. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.
Smurf Attack
Firewall logs
Mantrap
GIF Layering
26. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Private
Digital Certificate
Cognitive biometrics
Hoaxes
27. A ____ is designed to separate a nonsecured area from a secured area.
Mantrap
Rule Based Access Control
Prevention and detection
Subject
28. Viruses and worms are said to be self-____.
Replicating
Replay Attack
Roller barrier
Bluesnarfing
29. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Rule Based Access Control
Data
DAP
UDP Flood
30. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Stateless Firewall
Brute Force Attack
DMS (Demilitarized Zone)
Physical security
31. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Wireless VLANs
Character
Bluejacking
Root
32. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Identity Theft
Orphaned
Stateful packet filtering
Denial of service attack
33. Web application attacks are considered ____ attacks.
OAuth
TCP/IP
Separation of duties
Server-Side
34. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Physical security access control measures
TACACS
Malicious Insiders
CHAP (Challenge Handshake Authentication Protocol)
35. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Rainbow Tables
ACL (Access Control List)
Content filtering
White Hat
36. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.
Denial of service attack
White box
Data
Client_Hello
37. Using a single authentication credential that is shared across multiple networks.
Content-Filtering Firewall
Identity management
Identification
Hoaxes
38. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Malicious Insiders
Biometrics
Cybercriminals
What is asymmetic encryption?
39. Password and BioMetric
Reverse proxy
Two factor security
Cyber Theft
Insiders
40. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.
Prevention and detection
ARP Poisoning
RADIUS
Smurf Attack
41. A ____ does not serve clients - but instead routes incoming requests to the correct server.
Reverse proxy
Worm
Content inspection
Man-made Threat
42. It accepts spoken words for input as if they had been typed on the keyboard.
Extreme temperatures
DLP
Digital Certificate
Speech recognition
43. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Session hijacking
Trusted OS
Script Kiddie
Spear Phishing
44. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.
Private
Virus
Rainbow Tables
Distributed
45. A set of permissions that are attached to an object.
Rootkit
Encryption
ACL
Password Crackers
46. A program that is automatically downloaded to your computer without your consent or even your knowledge.
Drive-by Download
Server-Side
DMS (Demilitarized Zone)
Replay
47. A group of piconets in which connections exist between different piconets is called a ____.
Client_Hello
Mantrap
Fake Antivirus
Scatternet
48. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Logic Bomb
CHAP (Challenge Handshake Authentication Protocol)
Protocol analyzer
Testing
49. Fingerprints and patterns
BioMetric devices
Spear Phishing
Trusted OS
Packet filtering
50. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.
Password
MPack
Distributed
Replay