Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Pretending to be another person.






2. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






3. A ____ means that the application or service assigned to that port is listening for any instructions.






4. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






5. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






6. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






7. Broadcast storms can be prevented with ____.






8. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






9. Set of rules that allow or deny traffic






10. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






11. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






12. People very knowledgeable about computers who use their knowledge to invade other people's computers






13. Content filtering - encryption - firewalls






14. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






15. ____ attacks are responsible for half of all malware delivered by Web advertising.






16. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






17. Computer crimes involving the theft of money






18. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






19. The process of giving someone permission to do or have something






20. Password and BioMetric






21. The time it takes for a key to be pressed and then released.






22. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






23. Often used for managing user access to one or more systems.






24. Provides a greater degree of security by implementing port-based authentication.






25. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






26. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






27. An attacker motivated by the ideology to attack computer or infrastructure networks.






28. Sending high volumes of UDP requests to a target.






29. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






30. The ____ model is the least restrictive.






31. A variety of threats such as viruses - worms - and Trojan horses






32. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






33. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






34. A framework for transporting authentication protocols instead of the authentication protocol itself.






35. A ____ attack is similar to a passive man-in-the-middle attack.






36. A threat that originates from outside the company. (ex. power failure.)






37. A ____ virus infects the Master Boot Record of a hard disk drive.






38. A security analysis of the transaction within its approved context.






39. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






40. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






41. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






42. Below 40% or above 50%






43. Small electronic devices that change user passwords automatically






44. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






45. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






46. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






47. The action that is taken by the subject over the object is called a ____.






48. Software that can guess passwords






49. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






50. Lock - conduit - card key - video equipment - secured guard






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests