Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






2. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






3. A technology that can help to evenly distribute work across a network.






4. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






5. A variety of threats such as viruses - worms - and Trojan horses






6. Scrambles information into an alternative form that requires a key or password to decrypt the information






7. An attack that forces a user to unintentionally click a link.






8. Form of phishing that targets wealthy individuals.






9. A firewall capable of monitoring a data stream from end to end.






10. The process of giving someone permission to do or have something






11. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






12. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






13. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






14. Viruses and worms are said to be self-____.






15. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






16. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






17. Indicates when an account is no longer active.






18. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






19. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






20. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






21. A form of filtering that blocks only sites specified as harmful.






22. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






23. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






24. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






25. The set of letters - symbols - and characters that make up the password are known as a ____ set.






26. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






27. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






28. It accepts spoken words for input as if they had been typed on the keyboard.






29. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






30. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






31. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






32. Allows a single access point to service different types of users.






33. How secure the data in your backups is-can use physical security or encryption






34. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






35. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






36. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






37. It is able to code and decode data






38. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






39. A private key and public key






40. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






41. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






42. The weakness of passwords centers on ____.






43. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






44. A ____ means that the application or service assigned to that port is listening for any instructions.






45. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






46. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






47. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






48. An authentication process that involves three steps.






49. Software that can guess passwords






50. Can also capture transmissions that contain passwords.