Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Fingerprints and patterns






2. A set of permissions that are attached to an object.






3. A technique for crashing by sending too much data to the buffer in a comuter's memory






4. An attacker slips through a secure area following a legitimate employee.






5. The action that is taken by the subject over the object is called a ____.






6. Web application attacks are considered ____ attacks.






7. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






8. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






9. Users who access a Web server are usually restricted to the ____ directory.






10. The time it takes for a key to be pressed and then released.






11. How often you perform your backups (cost-benefit analysis of backing up)






12. A program that is automatically downloaded to your computer without your consent or even your knowledge.






13. A ____ is designed to separate a nonsecured area from a secured area.






14. When DNS servers exchange information among themselves it is known as a ____.






15. A variety of threats such as viruses - worms - and Trojan horses






16. Allows a single access point to service different types of users.






17. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






18. These accounts are user accounts that remain active after an employee has left an organization.






19. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






20. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






21. Computer crimes involving the theft of money






22. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






23. ____ is an image spam that is divided into multiple images.






24. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






25. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






26. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






27. Lock - conduit - card key - video equipment - secured guard






28. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






29. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






30. Sifting through a company's garbage to find information to help break into their computers






31. Scrambles information into an alternative form that requires a key or password to decrypt the information






32. It accepts spoken words for input as if they had been typed on the keyboard.






33. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






34. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






35. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






36. The protection of information from accidental or intentional misuse by persons inside or outside an organization






37. Related to the perception - thought process - and understanding of the user.






38. A method for confirming users' identities






39. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






40. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






41. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






42. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






43. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






44. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






45. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






46. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






47. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






48. An attack that sends unsolicited messages to Bluetooth-enabled devices.






49. Can also capture transmissions that contain passwords.






50. Below 40% or above 50%