Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Web application attacks are considered ____ attacks.






2. An attack that sends unsolicited messages to Bluetooth-enabled devices.






3. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






4. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






5. A form of filtering that blocks only sites specified as harmful.






6. A program that is automatically downloaded to your computer without your consent or even your knowledge.






7. ____ attacks are responsible for half of all malware delivered by Web advertising.






8. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






9. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






10. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






11. Content filtering - encryption - firewalls






12. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






13. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






14. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






15. How many past backups you keep - what you did on your machine etc.






16. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






17. Below 70 degrees or above 75 degrees






18. Indicates when an account is no longer active.






19. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






20. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






21. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






22. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






23. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






24. People very knowledgeable about computers who use their knowledge to invade other people's computers






25. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






26. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






27. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






28. Could become a key element in authentication in the future.






29. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






30. A method for confirming users' identities






31. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






32. Securing a restricted area by erecting a barrier is called ____.






33. Sending high volumes of UDP requests to a target.






34. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






35. A means of managing and presenting computer resources by function without regard to their physical layout or location.






36. An attacker motivated by the ideology to attack computer or infrastructure networks.






37. A threat that originates from outside the company. (ex. power failure.)






38. Computer crimes involving the theft of money






39. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






40. A secret combination of letters - numbers - and/or characters that only the user should know.






41. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






42. The process of giving someone permission to do or have something






43. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






44. A security analysis of the transaction within its approved context.






45. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






46. Wants to cause as much damage as possible - without a particular target or goal.






47. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






48. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






49. It is able to code and decode data






50. Pretending to be another person.