Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Allows a single access point to service different types of users.






2. A pay-per-use computing model in which customers pay only for the computing resources they need.






3. Provides a greater degree of security by implementing port-based authentication.






4. Can be used to determine whether new IP addresses are attempting to probe the network.






5. When DNS servers exchange information among themselves it is known as a ____.






6. The protection of information from accidental or intentional misuse by persons inside or outside an organization






7. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






8. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






9. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






10. A framework for transporting authentication protocols instead of the authentication protocol itself.






11. The time it takes for a key to be pressed and then released.






12. The process of giving someone permission to do or have something






13. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






14. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






15. The most restrictive access control model is ____.






16. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






17. Web application attacks are considered ____ attacks.






18. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






19. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






20. Using a single authentication credential that is shared across multiple networks.






21. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






22. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






23. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






24. How many past backups you keep - what you did on your machine etc.






25. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






26. Could become a key element in authentication in the future.






27. Lock - conduit - card key - video equipment - secured guard






28. A technique for crashing by sending too much data to the buffer in a comuter's memory






29. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






30. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






31. Scrambles information into an alternative form that requires a key or password to decrypt the information






32. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






33. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






34. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






35. A ____ means that the application or service assigned to that port is listening for any instructions.






36. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






38. Broadcast storms can be prevented with ____.






39. Can create entries in a log for all queries that are received.






40. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






41. An attacker motivated by the ideology to attack computer or infrastructure networks.






42. The action that is taken by the subject over the object is called a ____.






43. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






44. Ensures that messages are not corrupt or tampered with






45. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






46. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






47. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






48. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






49. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






50. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests