Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An authentication process that involves three steps.






2. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






3. When organizations use software that filters content to prevent the transmission of unauthorized information






4. Provides a greater degree of security by implementing port-based authentication.






5. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






6. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






7. People very knowledgeable about computers who use their knowledge to invade other people's computers






8. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






9. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






10. Indicates when an account is no longer active.






11. An attack that forces a user to unintentionally click a link.






12. A security analysis of the transaction within its approved context.






13. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






14. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






15. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






16. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






17. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






18. The process of giving someone permission to do or have something






19. Floods a Web site with so many requests for service that it slows down or crashes the site






20. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






21. Sending high volumes of ICMP (usually ping) packets to a target.






22. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






23. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






24. Scrambles information into an alternative form that requires a key or password to decrypt the information






25. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






26. A variety of threats such as viruses - worms - and Trojan horses






27. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






28. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






29. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






30. A firewall capable of monitoring a data stream from end to end.






31. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






32. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






33. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






34. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






35. Securing a restricted area by erecting a barrier is called ____.






36. Allows a single access point to service different types of users.






37. A pay-per-use computing model in which customers pay only for the computing resources they need.






38. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






39. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






40. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






41. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






42. Four interrelated aspects to _________:Access - data - infrastructure - computers






43. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






44. A method for confirming users' identities






45. A ____ does not serve clients - but instead routes incoming requests to the correct server.






46. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






47. Ensures that messages are not corrupt or tampered with






48. ____ is an image spam that is divided into multiple images.






49. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






50. The geographical storage of your backups-safest place is a different place from where you keep your actual data