SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.
Brute Force
Loop Protection
Social engineering
Encryption
2. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.
Cyberbullying
Web security gateway
Replay Attack
Rogue
3. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.
Replay Attack
DNS poisoning
Roller barrier
Federated identity management
4. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Spyware
Natural Threat
Packet tampering
Ciphertext
5. Password and BioMetric
Cyberterrorist
Two factor security
Internal Threat
Proximity reader
6. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
EAP
Logic Bomb
Virus
Internal Threat
7. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.
Proximity reader
Replay Attack
Extreme Humidity
Bluejacking
8. A security analysis of the transaction within its approved context.
Human memory
OAuth
Content inspection
Cyberterrorist
9. A user accessing a computer system must present credentials or ____ when logging on to the system.
Router
Data
Kerberos
Identification
10. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.
Standard biometrics
Protocol analyzer
Physical security access control measures
Symmetric encryption
11. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Floor Guard
Digital Certificate
Access Control
Role
12. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
OAuth
Distributed
Operation
Vishing
13. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.
MPack
Federated identity management
SSO
Replay Attack
14. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.
Stateful packet filtering
Security
EAP
Malicious code
15. The set of letters - symbols - and characters that make up the password are known as a ____ set.
Character
Electronic Vandal
DNS poisoning
DNS
16. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Internal Threat
History
Worm
Mouse Trapping
17. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
computer footprint
LDAP injection
Extreme Humidity
Bluesnarfing
18. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Whaling
Content inspection
Character
Authentication request
19. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
Cybercriminals
Extreme Humidity
70
Loop Protection
20. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
Role Based Access Control
Script Kiddie
Cyberbullying
Data
21. Set of rules that allow or deny traffic
Chain
Operation
Account expiration
Packet filtering
22. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)
Bluejacking
Human memory
Ciphertext
Fencing
23. Sending high volumes of UDP requests to a target.
Virtualization
War Driving
Replay
UDP Flood
24. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
DNS
70
Virtualization
Testing
25. A private key and public key
Impersonation
Speech recognition
What is asymmetic encryption?
Symmetric encryption
26. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.
Denial of service attack
Word Splitting
Hybird
SYN Flood
27. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.
Rootkit
War Driving
Amart card
White box
28. A form of filtering that blocks only sites specified as harmful.
DNS
IEEE 802.1x
Bluejacking
Blacklisting Software
29. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Spear Phishing
Replay Attack
SSO
DAC
30. Broadcast storms can be prevented with ____.
Loop Protection
Token
Digital Certificate
Subject
31. A user under Role Based Access Control can be assigned only one ____.
TACACS
Rootkit
Dwell Time
Role
32. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
BioMetric devices
Orphaned
Rogue
CCTV
33. Content filtering - encryption - firewalls
Prevention and detection
ACL (Access Control List)
Scatternet
Three-Way Handshake
34. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
External Threat
Media for backups
Shoulder Surfing
TCP/IP
35. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
Account expiration
Client_Hello
DNS Log
36. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)
Human memory
Three-Way Handshake
Eavesdropping Attack
Replicating
37. Fingerprints and patterns
Bluejacking
BioMetric devices
Word Splitting
Amart card
38. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.
Stateful packet filtering
Ciphertext
Proximity reader
Testing
39. A group of piconets in which connections exist between different piconets is called a ____.
Federated identity management
Scatternet
Password
Offline cracking
40. A firewall capable of monitoring a data stream from end to end.
Bluesnarfing
Encryption
Distributed storage
Stateful Firewall
41. It is able to code and decode data
Fake Antivirus
Symmetric encryption
ACL (Access Control List)
Root
42. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.
Authorization
TACACS
Evil Twin
DMS (Demilitarized Zone)
43. The geographical storage of your backups-safest place is a different place from where you keep your actual data
What is asymmetic encryption?
Ciphertext
Replicating
Distributed storage
44. A ____ encrypts all data that is transmitted between the remote device and the network.
VPN
Replay
Man-made Threat
LDAP injection
45. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.
Media for backups
Private
Reverse proxy
Trojan-horse virus
46. The most restrictive access control model is ____.
Protocol analyzer
Mandatory Access Control
Cracker
Fencing
47. ____ attacks are responsible for half of all malware delivered by Web advertising.
War Driving
Association request
Fake Antivirus
Media for backups
48. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.
Honeypot
Association request
Black Hat
OAuth
49. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.
Token
Stateless Firewall
Whaling
Hardware Attack
50. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)
Black Hat
Distributed storage
Brute Force
Hardware Attack
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests