Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






2. Viruses and worms are said to be self-____.






3. Wants to cause as much damage as possible - without a particular target or goal.






4. The ____ model is the least restrictive.






5. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






6. An attacker motivated by the ideology to attack computer or infrastructure networks.






7. Could become a key element in authentication in the future.






8. The process of verifying that your backups actually work






9. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






10. Fingerprints and patterns






11. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






12. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






13. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






14. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






15. Pretending to be another person.






16. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






17. It is able to code and decode data






18. A means of managing and presenting computer resources by function without regard to their physical layout or location.






19. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






20. A ____ means that the application or service assigned to that port is listening for any instructions.






21. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






22. A firewall capable of monitoring a data stream from end to end.






23. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






24. A security analysis of the transaction within its approved context.






25. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






26. The protection of information from accidental or intentional misuse by persons inside or outside an organization






27. A technique for crashing by sending too much data to the buffer in a comuter's memory






28. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






29. The set of letters - symbols - and characters that make up the password are known as a ____ set.






30. The weakness of passwords centers on ____.






31. Sending high volumes of ICMP (usually ping) packets to a target.






32. A ____ attack is similar to a passive man-in-the-middle attack.






33. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






34. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






35. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






36. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






37. Lock - conduit - card key - video equipment - secured guard






38. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






39. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






40. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






41. ____ involves horizontally separating words - although it is still readable by the human eye.






42. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






43. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






44. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






45. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






46. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






47. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






48. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






49. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






50. Below 40% or above 50%







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests