Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most restrictive access control model is ____.






2. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






3. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






4. How often you perform your backups (cost-benefit analysis of backing up)






5. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






6. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






7. The protection of information from accidental or intentional misuse by persons inside or outside an organization






8. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






9. When organizations use software that filters content to prevent the transmission of unauthorized information






10. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






11. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






12. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






13. How many past backups you keep - what you did on your machine etc.






14. Viruses and worms are said to be self-____.






15. Pretending to be another person.






16. A ____ encrypts all data that is transmitted between the remote device and the network.






17. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






18. Sending high volumes of ICMP (usually ping) packets to a target.






19. A ____ means that the application or service assigned to that port is listening for any instructions.






20. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






21. A private key and public key






22. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






23. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






24. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






25. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






26. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






27. A threat that originates from outside the company. (ex. power failure.)






28. Software that can guess passwords






29. It accepts spoken words for input as if they had been typed on the keyboard.






30. The set of letters - symbols - and characters that make up the password are known as a ____ set.






31. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






32. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






33. An authentication process that involves three steps.






34. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






35. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






36. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






37. Requires mutual authentication used for WLAN encryption using Cisco client software.






38. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






39. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






40. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






41. Can create entries in a log for all queries that are received.






42. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






43. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






44. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






45. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






46. A security analysis of the transaction within its approved context.






47. Small electronic devices that change user passwords automatically






48. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






49. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






50. It is able to code and decode data