Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






2. Set of rules that allow or deny traffic






3. A private key and public key






4. An attacker motivated by the ideology to attack computer or infrastructure networks.






5. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






6. Provides a greater degree of security by implementing port-based authentication.






7. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






8. The protection of information from accidental or intentional misuse by persons inside or outside an organization






9. Below 40% or above 50%






10. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






11. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






12. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






13. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






14. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






15. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






16. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






17. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






18. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






19. Computer crimes involving the theft of money






20. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






21. Four interrelated aspects to _________:Access - data - infrastructure - computers






22. Scrambles information into an alternative form that requires a key or password to decrypt the information






23. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






24. Requires mutual authentication used for WLAN encryption using Cisco client software.






25. Related to the perception - thought process - and understanding of the user.






26. Floods a Web site with so many requests for service that it slows down or crashes the site






27. A set of permissions that are attached to an object.






28. It accepts spoken words for input as if they had been typed on the keyboard.






29. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






30. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






31. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






32. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






33. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






34. Software that can guess passwords






35. The ____ model is the least restrictive.






36. A form of filtering that blocks only sites specified as harmful.






37. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






38. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






39. Sifting through a company's garbage to find information to help break into their computers






40. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






41. To create a rainbow table - each ____ begins with an initial password that is encrypted.






42. A group of piconets in which connections exist between different piconets is called a ____.






43. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






44. A pay-per-use computing model in which customers pay only for the computing resources they need.






45. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






46. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






47. The weakness of passwords centers on ____.






48. Indicates when an account is no longer active.






49. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






50. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.