Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






2. When DNS servers exchange information among themselves it is known as a ____.






3. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






4. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






5. An authentication process that involves three steps.






6. Ensures that messages are not corrupt or tampered with






7. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






8. These attacks may allow an attacker to construct LDAP statements based on user input statements.






9. Indicates when an account is no longer active.






10. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






11. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






12. Floods a Web site with so many requests for service that it slows down or crashes the site






13. Password and BioMetric






14. A variety of threats such as viruses - worms - and Trojan horses






15. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






16. A ____ encrypts all data that is transmitted between the remote device and the network.






17. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






18. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






19. Computer crimes involving the theft of money






20. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






21. Sending high volumes of UDP requests to a target.






22. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






23. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






24. A ____ means that the application or service assigned to that port is listening for any instructions.






25. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






26. Lock - conduit - card key - video equipment - secured guard






27. Web application attacks are considered ____ attacks.






28. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






29. A technique for crashing by sending too much data to the buffer in a comuter's memory






30. A commonly used technique by pornography sites where a user gets "locked" in a web site.






31. Allows a single access point to service different types of users.






32. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






33. A set of permissions that are attached to an object.






34. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






35. Viruses and worms are said to be self-____.






36. These accounts are user accounts that remain active after an employee has left an organization.






37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






38. When organizations use software that filters content to prevent the transmission of unauthorized information






39. It is able to code and decode data






40. An attack that forces a user to unintentionally click a link.






41. Holds the promise of reducing the number of usernames and passwords that users must memorize.






42. An attacker slips through a secure area following a legitimate employee.






43. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






44. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






45. The most restrictive access control model is ____.






46. Sending high volumes of ICMP (usually ping) packets to a target.






47. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






48. A ____ does not serve clients - but instead routes incoming requests to the correct server.






49. The process of giving someone permission to do or have something






50. How secure the data in your backups is-can use physical security or encryption