Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These attacks may allow an attacker to construct LDAP statements based on user input statements.






2. Software that can guess passwords






3. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






4. Broadcast storms can be prevented with ____.






5. Sending high volumes of ICMP (usually ping) packets to a target.






6. A ____ is designed to separate a nonsecured area from a secured area.






7. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






8. Floods a Web site with so many requests for service that it slows down or crashes the site






9. The geographical storage of your backups-safest place is a different place from where you keep your actual data






10. A ____ is a network set up with intentional vulnerabilities.






11. Hides inside other software - usually as an attachment or a downloadable file






12. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






13. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






14. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






15. Password and BioMetric






16. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






17. The weakness of passwords centers on ____.






18. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






19. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






20. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






21. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






22. Can create entries in a log for all queries that are received.






23. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






24. Often used for managing user access to one or more systems.






25. Sifting through a company's garbage to find information to help break into their computers






26. Small electronic devices that change user passwords automatically






27. A technique that allows private IP addresses to be used on the public Internet.






28. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






29. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






30. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






31. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






32. Requires mutual authentication used for WLAN encryption using Cisco client software.






33. Could become a key element in authentication in the future.






34. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






35. A method for confirming users' identities






36. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






37. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






38. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






39. A secret combination of letters - numbers - and/or characters that only the user should know.






40. Using a single authentication credential that is shared across multiple networks.






41. The action that is taken by the subject over the object is called a ____.






42. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






43. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






44. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






45. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






46. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






47. A form of filtering that blocks only sites specified as harmful.






48. The time it takes for a key to be pressed and then released.






49. A means of managing and presenting computer resources by function without regard to their physical layout or location.






50. Viruses and worms are said to be self-____.