Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ensures that messages are not corrupt or tampered with






2. The weakness of passwords centers on ____.






3. Often used for managing user access to one or more systems.






4. Lock - conduit - card key - video equipment - secured guard






5. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






6. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






7. A security analysis of the transaction within its approved context.






8. ____ attacks are responsible for half of all malware delivered by Web advertising.






9. An attacker slips through a secure area following a legitimate employee.






10. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






11. Related to the perception - thought process - and understanding of the user.






12. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






13. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






14. A ____ attack is similar to a passive man-in-the-middle attack.






15. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






16. The set of letters - symbols - and characters that make up the password are known as a ____ set.






17. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






18. Viruses and worms are said to be self-____.






19. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






20. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






21. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






22. A variety of threats such as viruses - worms - and Trojan horses






23. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






24. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






25. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






26. A pay-per-use computing model in which customers pay only for the computing resources they need.






27. Set of rules that allow or deny traffic






28. Provides a greater degree of security by implementing port-based authentication.






29. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






30. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






31. A set of permissions that are attached to an object.






32. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






33. Allows a single access point to service different types of users.






34. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






35. The process of giving someone permission to do or have something






36. Software that can guess passwords






37. An attack that sends unsolicited messages to Bluetooth-enabled devices.






38. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






39. Password and BioMetric






40. Requires mutual authentication used for WLAN encryption using Cisco client software.






41. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






42. How secure the data in your backups is-can use physical security or encryption






43. A ____ encrypts all data that is transmitted between the remote device and the network.






44. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






45. The time it takes for a key to be pressed and then released.






46. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






47. Form of phishing that targets wealthy individuals.






48. An attack that forces a user to unintentionally click a link.






49. A form of filtering that blocks only sites specified as harmful.






50. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing