Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Small electronic devices that change user passwords automatically






2. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






3. Below 70 degrees or above 75 degrees






4. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






5. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






6. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






7. These accounts are user accounts that remain active after an employee has left an organization.






8. A form of filtering that blocks only sites specified as harmful.






9. A ____ is a network set up with intentional vulnerabilities.






10. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






11. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






12. How many past backups you keep - what you did on your machine etc.






13. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






14. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






15. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






16. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






17. An attack that sends unsolicited messages to Bluetooth-enabled devices.






18. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






19. ____ can be prewired for electrical power as well as wired network connections.






20. A ____ virus infects the Master Boot Record of a hard disk drive.






21. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






22. A technique that allows private IP addresses to be used on the public Internet.






23. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






24. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






25. Set of rules that allow or deny traffic






26. Password and BioMetric






27. Securing a restricted area by erecting a barrier is called ____.






28. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






29. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






30. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






31. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






32. ____ is an image spam that is divided into multiple images.






33. People very knowledgeable about computers who use their knowledge to invade other people's computers






34. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






35. A technology that can help to evenly distribute work across a network.






36. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






37. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






38. Broadcast storms can be prevented with ____.






39. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






40. Can create entries in a log for all queries that are received.






41. The most restrictive access control model is ____.






42. A firewall that can block designated types of traffic from entering a protected network.






43. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






44. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






45. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






46. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






47. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






48. Can also capture transmissions that contain passwords.






49. A threat that originates from outside the company. (ex. power failure.)






50. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.