Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ is an image spam that is divided into multiple images.






2. When DNS servers exchange information among themselves it is known as a ____.






3. How many past backups you keep - what you did on your machine etc.






4. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






5. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






6. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






7. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






8. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






9. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






10. Fingerprints and patterns






11. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






12. A ____ does not serve clients - but instead routes incoming requests to the correct server.






13. A private key and public key






14. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






15. Hides inside other software - usually as an attachment or a downloadable file






16. Lock - conduit - card key - video equipment - secured guard






17. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






18. Wants to cause as much damage as possible - without a particular target or goal.






19. Sending high volumes of ICMP (usually ping) packets to a target.






20. The process of verifying that your backups actually work






21. To create a rainbow table - each ____ begins with an initial password that is encrypted.






22. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






23. A commonly used technique by pornography sites where a user gets "locked" in a web site.






24. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






25. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






26. Viruses and worms are said to be self-____.






27. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






28. A means of managing and presenting computer resources by function without regard to their physical layout or location.






29. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






30. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






31. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






32. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






33. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






34. Form of phishing that targets wealthy individuals.






35. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






36. A firewall capable of monitoring a data stream from end to end.






37. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






38. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






39. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






40. Broadcast storms can be prevented with ____.






41. A user under Role Based Access Control can be assigned only one ____.






42. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






43. A program that is automatically downloaded to your computer without your consent or even your knowledge.






44. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






45. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






46. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






47. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






48. A firewall that can block designated types of traffic from entering a protected network.






49. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






50. Content filtering - encryption - firewalls







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests