Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Broadcast storms can be prevented with ____.






2. The protection of information from accidental or intentional misuse by persons inside or outside an organization






3. Requires mutual authentication used for WLAN encryption using Cisco client software.






4. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






5. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






6. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






7. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






8. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






9. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






10. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






11. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






12. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






13. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






14. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






15. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






16. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






17. The most restrictive access control model is ____.






18. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






19. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






20. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






21. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






22. A variety of threats such as viruses - worms - and Trojan horses






23. A private key and public key






24. Password and BioMetric






25. The process of giving someone permission to do or have something






26. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






27. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






28. How often you perform your backups (cost-benefit analysis of backing up)






29. Software that can guess passwords






30. An attack that sends unsolicited messages to Bluetooth-enabled devices.






31. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






32. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






33. Can create entries in a log for all queries that are received.






34. A ____ does not serve clients - but instead routes incoming requests to the correct server.






35. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






36. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






37. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






38. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






39. A secret combination of letters - numbers - and/or characters that only the user should know.






40. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






41. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






42. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






43. Sending high volumes of ICMP (usually ping) packets to a target.






44. Users who access a Web server are usually restricted to the ____ directory.






45. Lock - conduit - card key - video equipment - secured guard






46. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






47. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






48. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






49. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






50. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests