Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hides inside other software - usually as an attachment or a downloadable file






2. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






3. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






4. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






5. Due to the limitations of online guessing - most password attacks today use ____.






6. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






7. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






8. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






9. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






10. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






11. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






12. Often used for managing user access to one or more systems.






13. A security analysis of the transaction within its approved context.






14. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






15. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






16. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






17. Floods a Web site with so many requests for service that it slows down or crashes the site






18. Can create entries in a log for all queries that are received.






19. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






20. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






21. These accounts are user accounts that remain active after an employee has left an organization.






22. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






23. Sending high volumes of UDP requests to a target.






24. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






25. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






26. A technology that can help to evenly distribute work across a network.






27. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






28. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






29. An attacker motivated by the ideology to attack computer or infrastructure networks.






30. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






31. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






32. A private key and public key






33. These attacks may allow an attacker to construct LDAP statements based on user input statements.






34. A framework for transporting authentication protocols instead of the authentication protocol itself.






35. Scrambles information into an alternative form that requires a key or password to decrypt the information






36. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






37. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






38. A technique for crashing by sending too much data to the buffer in a comuter's memory






39. Wants to cause as much damage as possible - without a particular target or goal.






40. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






41. Pretending to be another person.






42. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






43. Users who access a Web server are usually restricted to the ____ directory.






44. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






45. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






46. Lock - conduit - card key - video equipment - secured guard






47. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






48. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






49. The process of verifying that your backups actually work






50. The process of giving someone permission to do or have something