Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






2. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






3. A ____ is a network set up with intentional vulnerabilities.






4. Set of rules that allow or deny traffic






5. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






6. Broadcast storms can be prevented with ____.






7. ____ can be prewired for electrical power as well as wired network connections.






8. A technique for crashing by sending too much data to the buffer in a comuter's memory






9. ____ is an image spam that is divided into multiple images.






10. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






11. A secret combination of letters - numbers - and/or characters that only the user should know.






12. The ____ model is the least restrictive.






13. A user under Role Based Access Control can be assigned only one ____.






14. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






15. A firewall capable of monitoring a data stream from end to end.






16. A user accessing a computer system must present credentials or ____ when logging on to the system.






17. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






18. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






19. A ____ encrypts all data that is transmitted between the remote device and the network.






20. A method for confirming users' identities






21. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






22. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






23. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






24. Users who access a Web server are usually restricted to the ____ directory.






25. Pretending to be another person.






26. A form of filtering that blocks only sites specified as harmful.






27. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






28. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






29. An AP that is set up by an attacker.






30. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






31. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






32. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






33. How many past backups you keep - what you did on your machine etc.






34. Indicates when an account is no longer active.






35. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






36. An attack that sends unsolicited messages to Bluetooth-enabled devices.






37. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






38. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






39. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






40. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






41. The most restrictive access control model is ____.






42. A ____ attack is similar to a passive man-in-the-middle attack.






43. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






44. When organizations use software that filters content to prevent the transmission of unauthorized information






45. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






46. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






47. A program that is automatically downloaded to your computer without your consent or even your knowledge.






48. Password and BioMetric






49. A group of piconets in which connections exist between different piconets is called a ____.






50. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.