Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ____ is designed to separate a nonsecured area from a secured area.






2. Scrambles information into an alternative form that requires a key or password to decrypt the information






3. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






4. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






5. Hides inside other software - usually as an attachment or a downloadable file






6. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






7. ____ can be prewired for electrical power as well as wired network connections.






8. It is able to code and decode data






9. It accepts spoken words for input as if they had been typed on the keyboard.






10. A ____ virus infects the Master Boot Record of a hard disk drive.






11. Forwards packets across computer networks.






12. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






13. When organizations use software that filters content to prevent the transmission of unauthorized information






14. Due to the limitations of online guessing - most password attacks today use ____.






15. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






16. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






17. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






18. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






19. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






20. The action that is taken by the subject over the object is called a ____.






21. Small electronic devices that change user passwords automatically






22. A ____ means that the application or service assigned to that port is listening for any instructions.






23. A private key and public key






24. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






25. Computer crimes involving the theft of money






26. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






27. The process of giving someone permission to do or have something






28. Holds the promise of reducing the number of usernames and passwords that users must memorize.






29. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






30. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






31. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






32. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






33. A ____ encrypts all data that is transmitted between the remote device and the network.






34. Related to the perception - thought process - and understanding of the user.






35. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






36. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






37. A secret combination of letters - numbers - and/or characters that only the user should know.






38. Often used for managing user access to one or more systems.






39. A ____ does not serve clients - but instead routes incoming requests to the correct server.






40. Users who access a Web server are usually restricted to the ____ directory.






41. People very knowledgeable about computers who use their knowledge to invade other people's computers






42. The protection of information from accidental or intentional misuse by persons inside or outside an organization






43. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






44. To create a rainbow table - each ____ begins with an initial password that is encrypted.






45. A technology that can help to evenly distribute work across a network.






46. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






47. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






48. ____ involves horizontally separating words - although it is still readable by the human eye.






49. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






50. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.