Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






2. Four interrelated aspects to _________:Access - data - infrastructure - computers






3. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






4. Below 40% or above 50%






5. An attack that sends unsolicited messages to Bluetooth-enabled devices.






6. The process of verifying that your backups actually work






7. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






8. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






9. A ____ virus infects the Master Boot Record of a hard disk drive.






10. Software that can guess passwords






11. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






12. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






13. Can be used to determine whether new IP addresses are attempting to probe the network.






14. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






15. Password and BioMetric






16. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






17. A group of piconets in which connections exist between different piconets is called a ____.






18. Content filtering - encryption - firewalls






19. Form of phishing that targets wealthy individuals.






20. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






21. The geographical storage of your backups-safest place is a different place from where you keep your actual data






22. Set of rules that allow or deny traffic






23. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






24. A method for confirming users' identities






25. A ____ attack is similar to a passive man-in-the-middle attack.






26. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






27. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






28. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






29. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






30. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






31. Often used for managing user access to one or more systems.






32. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






33. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






34. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






35. A ____ does not serve clients - but instead routes incoming requests to the correct server.






36. An attack that sends unsolicited messages to Bluetooth-enabled devices.






37. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






38. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






39. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






40. People very knowledgeable about computers who use their knowledge to invade other people's computers






41. Web application attacks are considered ____ attacks.






42. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






43. A user accessing a computer system must present credentials or ____ when logging on to the system.






44. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






45. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






46. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






47. When organizations use software that filters content to prevent the transmission of unauthorized information






48. When DNS servers exchange information among themselves it is known as a ____.






49. ____ is an image spam that is divided into multiple images.






50. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)