Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






2. A firewall capable of monitoring a data stream from end to end.






3. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






4. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






5. A group of piconets in which connections exist between different piconets is called a ____.






6. A program that is automatically downloaded to your computer without your consent or even your knowledge.






7. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






8. An attacker motivated by the ideology to attack computer or infrastructure networks.






9. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






10. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






11. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






12. A technology that can help to evenly distribute work across a network.






13. Forwards packets across computer networks.






14. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






15. A ____ virus infects the Master Boot Record of a hard disk drive.






16. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






17. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






18. A framework for transporting authentication protocols instead of the authentication protocol itself.






19. An AP that is set up by an attacker.






20. Form of phishing that targets wealthy individuals.






21. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






22. A ____ attack is similar to a passive man-in-the-middle attack.






23. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






24. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






25. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






26. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






27. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






28. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






29. It is able to code and decode data






30. A firewall that can block designated types of traffic from entering a protected network.






31. ____ is an image spam that is divided into multiple images.






32. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






33. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






34. ____ can be prewired for electrical power as well as wired network connections.






35. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






36. Ensures that messages are not corrupt or tampered with






37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






38. The ____ model is the least restrictive.






39. A private key and public key






40. A pay-per-use computing model in which customers pay only for the computing resources they need.






41. The set of letters - symbols - and characters that make up the password are known as a ____ set.






42. Set of rules that allow or deny traffic






43. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






44. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






45. Holds the promise of reducing the number of usernames and passwords that users must memorize.






46. Using a single authentication credential that is shared across multiple networks.






47. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






48. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






49. Securing a restricted area by erecting a barrier is called ____.






50. ____ attacks are responsible for half of all malware delivered by Web advertising.