Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






2. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






3. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






4. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






5. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






6. Hides inside other software - usually as an attachment or a downloadable file






7. Due to the limitations of online guessing - most password attacks today use ____.






8. A secret combination of letters - numbers - and/or characters that only the user should know.






9. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






10. A commonly used technique by pornography sites where a user gets "locked" in a web site.






11. The ____ model is the least restrictive.






12. A ____ does not serve clients - but instead routes incoming requests to the correct server.






13. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






14. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






15. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






16. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






17. Lock - conduit - card key - video equipment - secured guard






18. A ____ attack is similar to a passive man-in-the-middle attack.






19. An attacker slips through a secure area following a legitimate employee.






20. Password and BioMetric






21. A method for confirming users' identities






22. When organizations use software that filters content to prevent the transmission of unauthorized information






23. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






24. A framework for transporting authentication protocols instead of the authentication protocol itself.






25. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






26. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






27. A private key and public key






28. These accounts are user accounts that remain active after an employee has left an organization.






29. A variety of threats such as viruses - worms - and Trojan horses






30. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






31. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






32. A set of permissions that are attached to an object.






33. Users who access a Web server are usually restricted to the ____ directory.






34. An attack that sends unsolicited messages to Bluetooth-enabled devices.






35. Fingerprints and patterns






36. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






37. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






38. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






39. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






40. When DNS servers exchange information among themselves it is known as a ____.






41. Wants to cause as much damage as possible - without a particular target or goal.






42. Content filtering - encryption - firewalls






43. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






44. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






45. An attacker motivated by the ideology to attack computer or infrastructure networks.






46. An AP that is set up by an attacker.






47. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






48. A program that is automatically downloaded to your computer without your consent or even your knowledge.






49. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






50. Requires mutual authentication used for WLAN encryption using Cisco client software.