Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






2. An attacker slips through a secure area following a legitimate employee.






3. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






4. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






5. An attacker motivated by the ideology to attack computer or infrastructure networks.






6. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






7. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






8. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






9. Floods a Web site with so many requests for service that it slows down or crashes the site






10. Pretending to be another person.






11. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






12. A threat that originates from outside the company. (ex. power failure.)






13. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






14. A set of permissions that are attached to an object.






15. A ____ does not serve clients - but instead routes incoming requests to the correct server.






16. Sifting through a company's garbage to find information to help break into their computers






17. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






18. A ____ virus infects the Master Boot Record of a hard disk drive.






19. A firewall that can block designated types of traffic from entering a protected network.






20. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






21. It is able to code and decode data






22. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






23. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






24. Form of phishing that targets wealthy individuals.






25. A private key and public key






26. Ensures that messages are not corrupt or tampered with






27. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






28. When DNS servers exchange information among themselves it is known as a ____.






29. ____ can be prewired for electrical power as well as wired network connections.






30. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






31. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






32. A form of filtering that blocks only sites specified as harmful.






33. A pay-per-use computing model in which customers pay only for the computing resources they need.






34. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






35. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






36. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






38. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






39. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






40. The ____ model is the least restrictive.






41. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






42. A ____ means that the application or service assigned to that port is listening for any instructions.






43. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






44. Could become a key element in authentication in the future.






45. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






46. Viruses and worms are said to be self-____.






47. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






48. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






49. Password and BioMetric






50. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)