Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






2. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






3. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






4. Requires mutual authentication used for WLAN encryption using Cisco client software.






5. Password and BioMetric






6. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






7. A set of permissions that are attached to an object.






8. A ____ virus infects the Master Boot Record of a hard disk drive.






9. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






10. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






11. The process of giving someone permission to do or have something






12. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






13. A ____ does not serve clients - but instead routes incoming requests to the correct server.






14. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






15. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






16. Scrambles information into an alternative form that requires a key or password to decrypt the information






17. A means of managing and presenting computer resources by function without regard to their physical layout or location.






18. The set of letters - symbols - and characters that make up the password are known as a ____ set.






19. Below 70 degrees or above 75 degrees






20. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






21. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






22. The process of verifying that your backups actually work






23. Four interrelated aspects to _________:Access - data - infrastructure - computers






24. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






25. A form of filtering that blocks only sites specified as harmful.






26. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






27. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






28. Provides a greater degree of security by implementing port-based authentication.






29. These attacks may allow an attacker to construct LDAP statements based on user input statements.






30. ____ can be prewired for electrical power as well as wired network connections.






31. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






32. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






33. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






34. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






35. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






36. A ____ is a network set up with intentional vulnerabilities.






37. An attack that sends unsolicited messages to Bluetooth-enabled devices.






38. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






39. A variety of threats such as viruses - worms - and Trojan horses






40. Below 40% or above 50%






41. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






42. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






43. Sending high volumes of UDP requests to a target.






44. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






45. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






46. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






47. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






48. The action that is taken by the subject over the object is called a ____.






49. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






50. A firewall capable of monitoring a data stream from end to end.