Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pretending to be another person.






2. Allows a single access point to service different types of users.






3. A ____ is a network set up with intentional vulnerabilities.






4. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






5. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






6. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






7. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






8. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






9. Floods a Web site with so many requests for service that it slows down or crashes the site






10. To create a rainbow table - each ____ begins with an initial password that is encrypted.






11. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






12. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






13. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






14. Related to the perception - thought process - and understanding of the user.






15. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






16. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






17. Indicates when an account is no longer active.






18. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






19. How secure the data in your backups is-can use physical security or encryption






20. The geographical storage of your backups-safest place is a different place from where you keep your actual data






21. Below 70 degrees or above 75 degrees






22. A firewall capable of monitoring a data stream from end to end.






23. People very knowledgeable about computers who use their knowledge to invade other people's computers






24. ____ is an image spam that is divided into multiple images.






25. An attacker motivated by the ideology to attack computer or infrastructure networks.






26. When DNS servers exchange information among themselves it is known as a ____.






27. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






28. A method for confirming users' identities






29. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






30. Requires mutual authentication used for WLAN encryption using Cisco client software.






31. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






32. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






33. A technology that can help to evenly distribute work across a network.






34. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






35. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






36. Password and BioMetric






37. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






38. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






39. Could become a key element in authentication in the future.






40. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






41. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






42. A firewall that can block designated types of traffic from entering a protected network.






43. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






44. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






45. Can also capture transmissions that contain passwords.






46. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






47. A framework for transporting authentication protocols instead of the authentication protocol itself.






48. Fingerprints and patterns






49. Wants to cause as much damage as possible - without a particular target or goal.






50. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests