Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can also capture transmissions that contain passwords.






2. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






3. Provides a greater degree of security by implementing port-based authentication.






4. Due to the limitations of online guessing - most password attacks today use ____.






5. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






6. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






7. Allows a single access point to service different types of users.






8. A technique for crashing by sending too much data to the buffer in a comuter's memory






9. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






10. A user accessing a computer system must present credentials or ____ when logging on to the system.






11. Form of phishing that targets wealthy individuals.






12. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






13. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






14. Often used for managing user access to one or more systems.






15. A secret combination of letters - numbers - and/or characters that only the user should know.






16. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






17. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






18. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






19. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






20. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






21. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






22. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






23. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






24. Content filtering - encryption - firewalls






25. A ____ is a network set up with intentional vulnerabilities.






26. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






27. An attacker motivated by the ideology to attack computer or infrastructure networks.






28. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






29. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






30. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






31. Sifting through a company's garbage to find information to help break into their computers






32. Software that can guess passwords






33. A threat that originates from outside the company. (ex. power failure.)






34. The ____ model is the least restrictive.






35. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






36. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






37. A ____ encrypts all data that is transmitted between the remote device and the network.






38. Fingerprints and patterns






39. A method for confirming users' identities






40. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






41. The process of giving someone permission to do or have something






42. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






43. ____ can be prewired for electrical power as well as wired network connections.






44. Using a single authentication credential that is shared across multiple networks.






45. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






46. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






47. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






48. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






49. ____ involves horizontally separating words - although it is still readable by the human eye.






50. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.