Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






2. Broadcast storms can be prevented with ____.






3. When DNS servers exchange information among themselves it is known as a ____.






4. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






5. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






6. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






7. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






8. An attacker motivated by the ideology to attack computer or infrastructure networks.






9. Can also capture transmissions that contain passwords.






10. A variety of threats such as viruses - worms - and Trojan horses






11. People very knowledgeable about computers who use their knowledge to invade other people's computers






12. A ____ virus infects the Master Boot Record of a hard disk drive.






13. Password and BioMetric






14. A technique for crashing by sending too much data to the buffer in a comuter's memory






15. Could become a key element in authentication in the future.






16. Allows a single access point to service different types of users.






17. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






18. How often you perform your backups (cost-benefit analysis of backing up)






19. Lock - conduit - card key - video equipment - secured guard






20. A form of filtering that blocks only sites specified as harmful.






21. A set of permissions that are attached to an object.






22. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






23. Four interrelated aspects to _________:Access - data - infrastructure - computers






24. A technique that allows private IP addresses to be used on the public Internet.






25. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






26. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






27. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






28. Sending high volumes of UDP requests to a target.






29. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






30. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






31. A ____ encrypts all data that is transmitted between the remote device and the network.






32. Wants to cause as much damage as possible - without a particular target or goal.






33. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






34. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






35. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






36. Using a single authentication credential that is shared across multiple networks.






37. A firewall that can block designated types of traffic from entering a protected network.






38. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






39. Small electronic devices that change user passwords automatically






40. Hides inside other software - usually as an attachment or a downloadable file






41. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






42. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






43. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






44. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






45. Sifting through a company's garbage to find information to help break into their computers






46. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






47. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






48. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






49. Fingerprints and patterns






50. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail