Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






2. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






3. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






4. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






5. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






6. A ____ is designed to separate a nonsecured area from a secured area.






7. A variety of threats such as viruses - worms - and Trojan horses






8. Password and BioMetric






9. An attack that forces a user to unintentionally click a link.






10. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






11. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






12. Can be used to determine whether new IP addresses are attempting to probe the network.






13. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






14. Sending high volumes of ICMP (usually ping) packets to a target.






15. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






16. Pretending to be another person.






17. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






18. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






19. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






20. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






21. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






22. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






23. A program that is automatically downloaded to your computer without your consent or even your knowledge.






24. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






25. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






26. A user accessing a computer system must present credentials or ____ when logging on to the system.






27. Content filtering - encryption - firewalls






28. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






29. A technology that can help to evenly distribute work across a network.






30. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






31. Computer crimes involving the theft of money






32. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






33. An authentication process that involves three steps.






34. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






35. A group of piconets in which connections exist between different piconets is called a ____.






36. The weakness of passwords centers on ____.






37. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






38. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






39. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






40. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






41. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






42. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






43. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






44. A secret combination of letters - numbers - and/or characters that only the user should know.






45. The most restrictive access control model is ____.






46. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






47. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






48. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






49. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






50. Four interrelated aspects to _________:Access - data - infrastructure - computers