SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Information Security
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.
Bluejacking
Brute Force Attack
Password Crackers
Spear Phishing
2. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac
Packet tampering
Macro
Malicious code
Phishing
3. The time it takes for a key to be pressed and then released.
DNS Hijacking
Dwell Time
Bluesnarfing
Backup frequency
4. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages
Stateful packet filtering
Three-Way Handshake
Ciphertext
Cyberstalking/Harassment
5. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.
Three-Way Handshake
DMS (Demilitarized Zone)
Web security gateway
Rule Based Access Control
6. Allows a single access point to service different types of users.
Standard biometrics
Wireless VLANs
Smurf Attack
SYN Flood
7. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.
Password Crackers
Kerberos
Tailgating
Extreme temperatures
8. Below 70 degrees or above 75 degrees
Hash encoding
Extreme temperatures
Electronic Activist (hacktivist)
Proximity reader
9. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.
IEEE 802.1x
WEP (Wired Equivalent Privacy)
Web security gateway
Cybercriminals
10. People very knowledgeable about computers who use their knowledge to invade other people's computers
History
Hacker
Distributed Denial of Service (DDoS)
Shoulder Surfing
11. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.
DNS Hijacking
External Threat
Distributed Denial of Service (DDoS)
Password
12. Ensures that messages are not corrupt or tampered with
Hash encoding
Cognitive biometrics
Human memory
Zone transfer
13. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.
Spoofing
ARP Poisoning
DNS
Worm
14. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Macro
Man-made Threat
Cyberstalking/Harassment
Content filtering
15. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.
Hardware Attack
GIF Layering
Bluesnarfing
DAP
16. A user accessing a computer system must present credentials or ____ when logging on to the system.
Identification
Standard biometrics
Proximity reader
Scatternet
17. An attack that forces a user to unintentionally click a link.
Spimming
Clickjacking
Challenge
Server-Side
18. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.
Rainbow Tables
OAuth
Packet filtering
Hash encoding
19. A group of piconets in which connections exist between different piconets is called a ____.
Honeypot
SSO
Cognitive biometrics
Scatternet
20. Indicates when an account is no longer active.
Information security
Content filtering
Account expiration
Identity Theft
21. A commonly used technique by pornography sites where a user gets "locked" in a web site.
Virus
WEP (Wired Equivalent Privacy)
Mouse Trapping
Hacker
22. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).
War Driving
Spear Phishing
PAT
Speech recognition
23. Due to the limitations of online guessing - most password attacks today use ____.
Buffer Overflow
Replicating
Virus
Offline cracking
24. A ____ virus infects the Master Boot Record of a hard disk drive.
Sniffer
Boot
DLP
LDAP injection
25. A firewall capable of monitoring a data stream from end to end.
Geometric variance
Bluesnarfing
Stateful Firewall
Replay
26. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.
Brute Force Attack
Rootkit
Honeynet
Worm
27. Web application attacks are considered ____ attacks.
Operation
Clickjacking
Server-Side
Dwell Time
28. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.
Drive-by Download
Environmental Threat
DLP
White Hat
29. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.
Port Scanner
Biometrics
CardSpace
Authentication request
30. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.
Bluesnarfing
Password Crackers
Cracker
Content filtering
31. It is able to code and decode data
Private
Rootkit
Ciphertext
Symmetric encryption
32. A ____ encrypts all data that is transmitted between the remote device and the network.
Bluesnarfing
VPN
Cyberterrorist
Password
33. An authentication process that involves three steps.
Private
Symmetric encryption
Three-Way Handshake
Cognitive biometrics
34. A variety of threats such as viruses - worms - and Trojan horses
Brute Force Attack
Authentication request
Flashing
Malicious code
35. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.
Offline cracking
Malicious Insiders
Trojan-horse virus
Distributed storage
36. An attacker slips through a secure area following a legitimate employee.
What is asymmetic encryption?
Symmetric encryption
Subject
Tailgating
37. There are almost ____ different Microsoft Windows file extensions that could contain a virus.
DAC
Cyber Theft
Adware
70
38. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in
Spear Phishing
Digital Certificate
Honeypot
Distributed
39. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.
Root
Environmental Threat
Cracker
Honeynet
40. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>
Mantrap
Phishing
Insiders
Human memory
41. A security analysis of the transaction within its approved context.
Rogue
Brute Force Attack
Rule Based Access Control
Content inspection
42. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Firewalls
Resident
Web security gateway
Flashing
43. An attacker motivated by the ideology to attack computer or infrastructure networks.
ACL (Access Control List)
Tailgate sensors
Malicious Insiders
Cyberterrorist
44. An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluejacking
Federated identity management
Floor Guard
Eavesdropping Attack
45. A secret combination of letters - numbers - and/or characters that only the user should know.
Clickjacking
Whaling
Password
Association request
46. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.
BioMetric devices
Resident
Separation of duties
Virtualization
47. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.
Biometrics
Physical security
Identity Theft
Tailgate sensors
48. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal
Word Splitting
Firewalls
Cyber Theft
Sniffer
49. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.
Floor Guard
Session hijacking
Insiders
GIF Layering
50. ____ involves horizontally separating words - although it is still readable by the human eye.
Content filtering
SSO
Word Splitting
Vishing