Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ attacks are responsible for half of all malware delivered by Web advertising.






2. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






3. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






4. It accepts spoken words for input as if they had been typed on the keyboard.






5. A means of managing and presenting computer resources by function without regard to their physical layout or location.






6. A secret combination of letters - numbers - and/or characters that only the user should know.






7. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






8. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






9. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






10. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






11. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






12. Requires mutual authentication used for WLAN encryption using Cisco client software.






13. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






14. Computer crimes involving the theft of money






15. A private key and public key






16. Provides a greater degree of security by implementing port-based authentication.






17. These accounts are user accounts that remain active after an employee has left an organization.






18. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






19. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






20. A technique that allows private IP addresses to be used on the public Internet.






21. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






22. A ____ is a network set up with intentional vulnerabilities.






23. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






24. A pay-per-use computing model in which customers pay only for the computing resources they need.






25. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






26. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






27. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






28. A variety of threats such as viruses - worms - and Trojan horses






29. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






30. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






31. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






32. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






33. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






34. A firewall that can block designated types of traffic from entering a protected network.






35. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






36. A set of permissions that are attached to an object.






37. A ____ attack is similar to a passive man-in-the-middle attack.






38. When organizations use software that filters content to prevent the transmission of unauthorized information






39. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






40. A group of piconets in which connections exist between different piconets is called a ____.






41. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






42. Related to the perception - thought process - and understanding of the user.






43. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






44. An authentication process that involves three steps.






45. Could become a key element in authentication in the future.






46. Securing a restricted area by erecting a barrier is called ____.






47. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






48. When DNS servers exchange information among themselves it is known as a ____.






49. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






50. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.