Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






2. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






3. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






4. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






5. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






6. The weakness of passwords centers on ____.






7. A pay-per-use computing model in which customers pay only for the computing resources they need.






8. Software that can guess passwords






9. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






10. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






11. A method for confirming users' identities






12. A variety of threats such as viruses - worms - and Trojan horses






13. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






14. A threat that originates from outside the company. (ex. power failure.)






15. A technology that can help to evenly distribute work across a network.






16. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






17. A ____ encrypts all data that is transmitted between the remote device and the network.






18. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






19. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






20. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






21. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






22. A ____ is a network set up with intentional vulnerabilities.






23. It is able to code and decode data






24. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






25. People very knowledgeable about computers who use their knowledge to invade other people's computers






26. A group of piconets in which connections exist between different piconets is called a ____.






27. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






28. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






29. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






30. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






31. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






32. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






33. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






34. Pretending to be another person.






35. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






36. A framework for transporting authentication protocols instead of the authentication protocol itself.






37. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






38. Content filtering - encryption - firewalls






39. Related to the perception - thought process - and understanding of the user.






40. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






41. An attack that sends unsolicited messages to Bluetooth-enabled devices.






42. Wants to cause as much damage as possible - without a particular target or goal.






43. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






44. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






45. Hides inside other software - usually as an attachment or a downloadable file






46. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






47. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






48. A ____ does not serve clients - but instead routes incoming requests to the correct server.






49. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






50. Often used for managing user access to one or more systems.