Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






2. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






3. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






4. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






5. A secret combination of letters - numbers - and/or characters that only the user should know.






6. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






7. ____ involves horizontally separating words - although it is still readable by the human eye.






8. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






9. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






10. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






11. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






12. Using a single authentication credential that is shared across multiple networks.






13. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






14. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






15. Form of phishing that targets wealthy individuals.






16. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






17. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






18. Hides inside other software - usually as an attachment or a downloadable file






19. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






20. The protection of information from accidental or intentional misuse by persons inside or outside an organization






21. Ensures that messages are not corrupt or tampered with






22. A ____ virus infects the Master Boot Record of a hard disk drive.






23. A private key and public key






24. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






25. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






26. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






27. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






28. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






29. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






30. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






31. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






32. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






33. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






34. Viruses and worms are said to be self-____.






35. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






36. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






37. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






38. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






39. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






40. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






41. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






42. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






43. The most restrictive access control model is ____.






44. A pay-per-use computing model in which customers pay only for the computing resources they need.






45. Can be used to determine whether new IP addresses are attempting to probe the network.






46. Often used for managing user access to one or more systems.






47. A user under Role Based Access Control can be assigned only one ____.






48. A firewall capable of monitoring a data stream from end to end.






49. Computer crimes involving the theft of money






50. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests