Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






2. An attack that sends unsolicited messages to Bluetooth-enabled devices.






3. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






4. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






5. An AP that is set up by an attacker.






6. Often used for managing user access to one or more systems.






7. A form of filtering that blocks only sites specified as harmful.






8. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






9. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






10. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






11. A commonly used technique by pornography sites where a user gets "locked" in a web site.






12. Wants to cause as much damage as possible - without a particular target or goal.






13. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






14. A ____ is a network set up with intentional vulnerabilities.






15. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






16. A user accessing a computer system must present credentials or ____ when logging on to the system.






17. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






18. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






19. How many past backups you keep - what you did on your machine etc.






20. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






21. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






22. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






23. The action that is taken by the subject over the object is called a ____.






24. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






25. Can create entries in a log for all queries that are received.






26. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






27. Sending high volumes of UDP requests to a target.






28. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






29. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






30. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






31. Using a single authentication credential that is shared across multiple networks.






32. Lock - conduit - card key - video equipment - secured guard






33. A threat that originates from outside the company. (ex. power failure.)






34. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






35. To create a rainbow table - each ____ begins with an initial password that is encrypted.






36. When DNS servers exchange information among themselves it is known as a ____.






37. Users who access a Web server are usually restricted to the ____ directory.






38. Password and BioMetric






39. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






40. Fingerprints and patterns






41. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






42. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






43. An attack that sends unsolicited messages to Bluetooth-enabled devices.






44. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






45. A program that is automatically downloaded to your computer without your consent or even your knowledge.






46. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






47. Requires mutual authentication used for WLAN encryption using Cisco client software.






48. A private key and public key






49. A technology that can help to evenly distribute work across a network.






50. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests