Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






2. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






3. A technique that allows private IP addresses to be used on the public Internet.






4. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






5. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






6. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






7. Due to the limitations of online guessing - most password attacks today use ____.






8. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






9. A framework for transporting authentication protocols instead of the authentication protocol itself.






10. A form of filtering that blocks only sites specified as harmful.






11. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






12. When DNS servers exchange information among themselves it is known as a ____.






13. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






14. Pretending to be another person.






15. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






16. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






17. Sending high volumes of UDP requests to a target.






18. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






19. Users who access a Web server are usually restricted to the ____ directory.






20. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






21. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






22. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






23. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






24. Four interrelated aspects to _________:Access - data - infrastructure - computers






25. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






26. How secure the data in your backups is-can use physical security or encryption






27. Hides inside other software - usually as an attachment or a downloadable file






28. Below 70 degrees or above 75 degrees






29. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






30. Wants to cause as much damage as possible - without a particular target or goal.






31. Sending high volumes of ICMP (usually ping) packets to a target.






32. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






33. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






34. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






35. A user accessing a computer system must present credentials or ____ when logging on to the system.






36. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






37. Ensures that messages are not corrupt or tampered with






38. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






39. Provides a greater degree of security by implementing port-based authentication.






40. A firewall capable of monitoring a data stream from end to end.






41. These accounts are user accounts that remain active after an employee has left an organization.






42. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






43. Can be used to determine whether new IP addresses are attempting to probe the network.






44. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






45. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






46. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






47. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






48. A ____ attack is similar to a passive man-in-the-middle attack.






49. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






50. A method for confirming users' identities







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests