Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






2. Form of phishing that targets wealthy individuals.






3. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






4. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






5. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






6. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






7. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






8. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






9. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






10. Sending high volumes of UDP requests to a target.






11. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






12. A framework for transporting authentication protocols instead of the authentication protocol itself.






13. The action that is taken by the subject over the object is called a ____.






14. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






15. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






16. An AP that is set up by an attacker.






17. The protection of information from accidental or intentional misuse by persons inside or outside an organization






18. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






19. These attacks may allow an attacker to construct LDAP statements based on user input statements.






20. A user under Role Based Access Control can be assigned only one ____.






21. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






22. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






23. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






24. Related to the perception - thought process - and understanding of the user.






25. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






26. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






27. How often you perform your backups (cost-benefit analysis of backing up)






28. To create a rainbow table - each ____ begins with an initial password that is encrypted.






29. A user accessing a computer system must present credentials or ____ when logging on to the system.






30. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






31. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






32. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






33. ____ involves horizontally separating words - although it is still readable by the human eye.






34. Due to the limitations of online guessing - most password attacks today use ____.






35. A ____ attack is similar to a passive man-in-the-middle attack.






36. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






37. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






38. How many past backups you keep - what you did on your machine etc.






39. When organizations use software that filters content to prevent the transmission of unauthorized information






40. A threat that originates from outside the company. (ex. power failure.)






41. Can create entries in a log for all queries that are received.






42. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






43. An attack that sends unsolicited messages to Bluetooth-enabled devices.






44. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






45. ____ can be prewired for electrical power as well as wired network connections.






46. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






47. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






48. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






49. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






50. It accepts spoken words for input as if they had been typed on the keyboard.