Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ensures that messages are not corrupt or tampered with






2. Web application attacks are considered ____ attacks.






3. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






4. A ____ is designed to separate a nonsecured area from a secured area.






5. The weakness of passwords centers on ____.






6. Lock - conduit - card key - video equipment - secured guard






7. Password and BioMetric






8. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






9. Fingerprints and patterns






10. A private key and public key






11. The protection of information from accidental or intentional misuse by persons inside or outside an organization






12. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






13. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






14. An AP that is set up by an attacker.






15. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






16. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






17. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






18. Computer crimes involving the theft of money






19. How many past backups you keep - what you did on your machine etc.






20. How often you perform your backups (cost-benefit analysis of backing up)






21. A technology that can help to evenly distribute work across a network.






22. A ____ virus infects the Master Boot Record of a hard disk drive.






23. Forwards packets across computer networks.






24. Requires mutual authentication used for WLAN encryption using Cisco client software.






25. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






26. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






27. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






28. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






29. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






30. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






31. The process of giving someone permission to do or have something






32. Often used for managing user access to one or more systems.






33. A method for confirming users' identities






34. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






35. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






36. Below 70 degrees or above 75 degrees






37. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






38. A user under Role Based Access Control can be assigned only one ____.






39. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






40. A variety of threats such as viruses - worms - and Trojan horses






41. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






42. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






43. A security analysis of the transaction within its approved context.






44. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






45. Set of rules that allow or deny traffic






46. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






47. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






48. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






49. Pretending to be another person.






50. A form of filtering that blocks only sites specified as harmful.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests