Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






2. Viruses and worms are said to be self-____.






3. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






4. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






5. A secret combination of letters - numbers - and/or characters that only the user should know.






6. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






7. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






8. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






9. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






10. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






11. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






12. Ensures that messages are not corrupt or tampered with






13. The process of giving someone permission to do or have something






14. Set of rules that allow or deny traffic






15. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






16. A variety of threats such as viruses - worms - and Trojan horses






17. A private key and public key






18. Sending high volumes of ICMP (usually ping) packets to a target.






19. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






20. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






21. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






22. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






23. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






24. Computer crimes involving the theft of money






25. These attacks may allow an attacker to construct LDAP statements based on user input statements.






26. An attack that sends unsolicited messages to Bluetooth-enabled devices.






27. Form of phishing that targets wealthy individuals.






28. When organizations use software that filters content to prevent the transmission of unauthorized information






29. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






30. The protection of information from accidental or intentional misuse by persons inside or outside an organization






31. A firewall capable of monitoring a data stream from end to end.






32. An AP that is set up by an attacker.






33. ____ can be prewired for electrical power as well as wired network connections.






34. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






35. Users who access a Web server are usually restricted to the ____ directory.






36. A ____ means that the application or service assigned to that port is listening for any instructions.






37. Wants to cause as much damage as possible - without a particular target or goal.






38. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






39. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






40. A security analysis of the transaction within its approved context.






41. A threat that originates from outside the company. (ex. power failure.)






42. ____ is an image spam that is divided into multiple images.






43. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






44. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






45. The time it takes for a key to be pressed and then released.






46. A pay-per-use computing model in which customers pay only for the computing resources they need.






47. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






48. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






49. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






50. It is able to code and decode data