Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






2. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






3. To create a rainbow table - each ____ begins with an initial password that is encrypted.






4. A framework for transporting authentication protocols instead of the authentication protocol itself.






5. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






6. When DNS servers exchange information among themselves it is known as a ____.






7. Below 40% or above 50%






8. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






9. A group of piconets in which connections exist between different piconets is called a ____.






10. Below 70 degrees or above 75 degrees






11. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






12. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






13. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






14. Fingerprints and patterns






15. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






16. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






17. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






18. ____ involves horizontally separating words - although it is still readable by the human eye.






19. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






20. Broadcast storms can be prevented with ____.






21. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






22. ____ can be prewired for electrical power as well as wired network connections.






23. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






24. Users who access a Web server are usually restricted to the ____ directory.






25. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






26. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






27. A means of managing and presenting computer resources by function without regard to their physical layout or location.






28. The time it takes for a key to be pressed and then released.






29. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






30. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






31. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






32. A ____ means that the application or service assigned to that port is listening for any instructions.






33. Software that can guess passwords






34. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






35. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






36. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






37. A variety of threats such as viruses - worms - and Trojan horses






38. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






39. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






40. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






41. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






42. These attacks may allow an attacker to construct LDAP statements based on user input statements.






43. A set of permissions that are attached to an object.






44. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






45. A method for confirming users' identities






46. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






47. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






48. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






49. The set of letters - symbols - and characters that make up the password are known as a ____ set.






50. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.