Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






2. A ____ virus infects the Master Boot Record of a hard disk drive.






3. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






4. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






5. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






6. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






7. Sending high volumes of ICMP (usually ping) packets to a target.






8. Sifting through a company's garbage to find information to help break into their computers






9. Below 70 degrees or above 75 degrees






10. A technique that allows private IP addresses to be used on the public Internet.






11. When DNS servers exchange information among themselves it is known as a ____.






12. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






13. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






14. Hides inside other software - usually as an attachment or a downloadable file






15. Sending high volumes of UDP requests to a target.






16. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






17. A security analysis of the transaction within its approved context.






18. These accounts are user accounts that remain active after an employee has left an organization.






19. A firewall that can block designated types of traffic from entering a protected network.






20. A threat that originates from outside the company. (ex. power failure.)






21. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






22. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






23. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






24. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






25. An authentication process that involves three steps.






26. A program that is automatically downloaded to your computer without your consent or even your knowledge.






27. A user under Role Based Access Control can be assigned only one ____.






28. These attacks may allow an attacker to construct LDAP statements based on user input statements.






29. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






30. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






31. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






32. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






33. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






34. ____ attacks are responsible for half of all malware delivered by Web advertising.






35. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






36. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






37. Viruses and worms are said to be self-____.






38. A variety of threats such as viruses - worms - and Trojan horses






39. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






40. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






41. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






42. A ____ is designed to separate a nonsecured area from a secured area.






43. An attack that sends unsolicited messages to Bluetooth-enabled devices.






44. A commonly used technique by pornography sites where a user gets "locked" in a web site.






45. To create a rainbow table - each ____ begins with an initial password that is encrypted.






46. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






47. Pretending to be another person.






48. Allows a single access point to service different types of users.






49. An attack that forces a user to unintentionally click a link.






50. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)