Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most restrictive access control model is ____.






2. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






3. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






4. These accounts are user accounts that remain active after an employee has left an organization.






5. Below 40% or above 50%






6. Floods a Web site with so many requests for service that it slows down or crashes the site






7. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






8. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






9. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






10. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






11. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






12. A form of filtering that blocks only sites specified as harmful.






13. Viruses and worms are said to be self-____.






14. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






15. Allows a single access point to service different types of users.






16. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






17. Set of rules that allow or deny traffic






18. Securing a restricted area by erecting a barrier is called ____.






19. Can create entries in a log for all queries that are received.






20. A technique for crashing by sending too much data to the buffer in a comuter's memory






21. Wants to cause as much damage as possible - without a particular target or goal.






22. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






23. People very knowledgeable about computers who use their knowledge to invade other people's computers






24. Lock - conduit - card key - video equipment - secured guard






25. A framework for transporting authentication protocols instead of the authentication protocol itself.






26. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






27. A private key and public key






28. The process of verifying that your backups actually work






29. Using a single authentication credential that is shared across multiple networks.






30. The set of letters - symbols - and characters that make up the password are known as a ____ set.






31. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






32. The protection of information from accidental or intentional misuse by persons inside or outside an organization






33. When DNS servers exchange information among themselves it is known as a ____.






34. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






35. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






36. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






37. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






38. A user accessing a computer system must present credentials or ____ when logging on to the system.






39. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






40. An attacker slips through a secure area following a legitimate employee.






41. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






42. Pretending to be another person.






43. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






44. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






45. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






46. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






47. ____ is an image spam that is divided into multiple images.






48. Often used for managing user access to one or more systems.






49. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






50. A firewall that can block designated types of traffic from entering a protected network.