Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Below 40% or above 50%






2. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






3. Related to the perception - thought process - and understanding of the user.






4. A ____ is designed to separate a nonsecured area from a secured area.






5. The action that is taken by the subject over the object is called a ____.






6. Broadcast storms can be prevented with ____.






7. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






8. When organizations use software that filters content to prevent the transmission of unauthorized information






9. The geographical storage of your backups-safest place is a different place from where you keep your actual data






10. An attacker slips through a secure area following a legitimate employee.






11. A firewall that can block designated types of traffic from entering a protected network.






12. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






13. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






14. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






15. Could become a key element in authentication in the future.






16. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






17. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






18. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






19. Using a single authentication credential that is shared across multiple networks.






20. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






21. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






22. Four interrelated aspects to _________:Access - data - infrastructure - computers






23. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






24. Securing a restricted area by erecting a barrier is called ____.






25. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






26. A firewall capable of monitoring a data stream from end to end.






27. An attack that forces a user to unintentionally click a link.






28. An attack that sends unsolicited messages to Bluetooth-enabled devices.






29. Ensures that messages are not corrupt or tampered with






30. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






31. A secret combination of letters - numbers - and/or characters that only the user should know.






32. Wants to cause as much damage as possible - without a particular target or goal.






33. The time it takes for a key to be pressed and then released.






34. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






35. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






36. When DNS servers exchange information among themselves it is known as a ____.






37. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






38. A threat that originates from outside the company. (ex. power failure.)






39. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






40. An AP that is set up by an attacker.






41. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






42. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






43. The weakness of passwords centers on ____.






44. Holds the promise of reducing the number of usernames and passwords that users must memorize.






45. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






46. To create a rainbow table - each ____ begins with an initial password that is encrypted.






47. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






48. Due to the limitations of online guessing - most password attacks today use ____.






49. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






50. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.