Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of verifying that your backups actually work






2. A ____ means that the application or service assigned to that port is listening for any instructions.






3. Set of rules that allow or deny traffic






4. A firewall capable of monitoring a data stream from end to end.






5. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






6. A pay-per-use computing model in which customers pay only for the computing resources they need.






7. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






8. Pretending to be another person.






9. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






10. Wants to cause as much damage as possible - without a particular target or goal.






11. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






12. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






13. An AP that is set up by an attacker.






14. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






15. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






16. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






17. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






18. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






19. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






20. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






21. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






22. How secure the data in your backups is-can use physical security or encryption






23. A ____ attack is similar to a passive man-in-the-middle attack.






24. A ____ encrypts all data that is transmitted between the remote device and the network.






25. Securing a restricted area by erecting a barrier is called ____.






26. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






27. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






28. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






29. A form of filtering that blocks only sites specified as harmful.






30. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






31. A variety of threats such as viruses - worms - and Trojan horses






32. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






33. ____ attacks are responsible for half of all malware delivered by Web advertising.






34. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






35. Holds the promise of reducing the number of usernames and passwords that users must memorize.






36. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






37. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






38. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






39. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






40. It is able to code and decode data






41. ____ can be prewired for electrical power as well as wired network connections.






42. Broadcast storms can be prevented with ____.






43. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






44. Requires mutual authentication used for WLAN encryption using Cisco client software.






45. Fingerprints and patterns






46. A user under Role Based Access Control can be assigned only one ____.






47. The ____ model is the least restrictive.






48. The action that is taken by the subject over the object is called a ____.






49. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






50. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests