SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of verifying that your backups actually work
Testing
Identity management
Subject
Evil Twin
2. A ____ means that the application or service assigned to that port is listening for any instructions.
Man-made Threat
Mandatory Access Control
Open Port
Rootkit
3. Set of rules that allow or deny traffic
Smurf Attack
Buffer Overflow
Three-Way Handshake
Packet filtering
4. A firewall capable of monitoring a data stream from end to end.
DNS Hijacking
DNS poisoning
Spyware
Stateful Firewall
5. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.
SYN Flood
Tailgate sensors
Zone transfer
TCP/IP
6. A pay-per-use computing model in which customers pay only for the computing resources they need.
Security
Hoaxes
Cloud computing
Open Port
7. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)
Human memory
Content filtering
Man-made Threat
White box
8. Pretending to be another person.
Web security gateway
Impersonation
Spoofing
Cognitive biometrics
9. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.
Electronic eavesdropping
Electronic Vandal
DLP
Load balancing
10. Wants to cause as much damage as possible - without a particular target or goal.
Wireless VLANs
Fencing
Operation
Electronic Vandal
11. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)
What is asymmetic encryption?
Internal Threat
Biometrics
Trusted OS
12. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
White box
Sniffer
Port Scanner
LDAP injection
13. An AP that is set up by an attacker.
Natural Threat
Spoofing
Evil Twin
DNS Log
14. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Cognitive biometrics
70
Identity Theft
Router
15. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.
Buffer Overflow
DNS Hijacking
PAT
Port Scanner
16. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.
Tailgate sensors
MPack
History
ARP Poisoning
17. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.
Authentication request
LDAP injection
ACL (Access Control List)
DAP
18. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.
Denial of service attack
Natural Threat
Stateful Firewall
SYN Flood
19. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.
Challenge
Insiders
Dwell Time
Server-Side
20. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting
Swiss Cheese
Speech recognition
Brute Force Attack
Biometrics
21. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.
VPN
computer footprint
Cyberbullying
Spear Phishing
22. How secure the data in your backups is-can use physical security or encryption
Token
Spoofing
Security
Packet filtering
23. A ____ attack is similar to a passive man-in-the-middle attack.
Firewall logs
Replay
Fencing
Geometric variance
24. A ____ encrypts all data that is transmitted between the remote device and the network.
ACL (Access Control List)
Flashing
Physical security access control measures
VPN
25. Securing a restricted area by erecting a barrier is called ____.
Fencing
Electronic eavesdropping
Stateful packet filtering
Dwell Time
26. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
computer footprint
Blacklisting Software
Logic Bomb
Authentication
27. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Brute Force Attack
Logic Bomb
Distributed Denial of Service (DDoS)
Kerberos
28. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Cyberstalking/Harassment
Tailgate sensors
Client_Hello
Hardware Attack
29. A form of filtering that blocks only sites specified as harmful.
Floor Guard
Blacklisting Software
DNS Log
SYN Flood
30. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.
Social engineering
Extreme temperatures
CCTV
Man-made Threat
31. A variety of threats such as viruses - worms - and Trojan horses
Malicious code
Spoofing
Chain
Firewall logs
32. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.
BioMetric devices
Script Kiddie
DLP
Electronic Activist (hacktivist)
33. ____ attacks are responsible for half of all malware delivered by Web advertising.
Word Splitting
Rule Based Access Control
Offline cracking
Fake Antivirus
34. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Mandatory Access Control
Electronic Vandal
Backup frequency
DAP
35. Holds the promise of reducing the number of usernames and passwords that users must memorize.
SSO
Electronic Vandal
Physical security access control measures
Distributed
36. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Stateful Firewall
History
GIF Layering
Macro
37. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.
Rule Based Access Control
Phishing
ARP Poisoning
Buffer Overflow
38. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.
Internal Threat
Brute Force Attack
Replicating
Phishing
39. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
WEP (Wired Equivalent Privacy)
Electronic eavesdropping
Geometric variance
UDP Flood
40. It is able to code and decode data
Symmetric encryption
Fake Antivirus
Three-Way Handshake
Replay Attack
41. ____ can be prewired for electrical power as well as wired network connections.
DMS (Demilitarized Zone)
Locking Cabinets
Backup scope
EAP
42. Broadcast storms can be prevented with ____.
Social engineering
Wireless security
Loop Protection
DNS Hijacking
43. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.
Content inspection
Router
Vishing
Locking Cabinets
44. Requires mutual authentication used for WLAN encryption using Cisco client software.
Subject
Encryption
Server-Side
LEAP
45. Fingerprints and patterns
DNS
Cyberterrorist
70
BioMetric devices
46. A user under Role Based Access Control can be assigned only one ____.
Role
Virus
Two factor security
Trojan-horse virus
47. The ____ model is the least restrictive.
Roller barrier
DAC
CHAP (Challenge Handshake Authentication Protocol)
Flashing
48. The action that is taken by the subject over the object is called a ____.
Spimming
Stateful Firewall
Operation
GIF Layering
49. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.
TCP/IP
Cognitive biometrics
Electronic Activist (hacktivist)
Open Port
50. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Identity Theft
Cracker
Security
UDP Flood
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests