Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






2. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






3. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






4. Web application attacks are considered ____ attacks.






5. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






6. Securing a restricted area by erecting a barrier is called ____.






7. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






8. The most restrictive access control model is ____.






9. To create a rainbow table - each ____ begins with an initial password that is encrypted.






10. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






11. Ensures that messages are not corrupt or tampered with






12. A ____ is designed to separate a nonsecured area from a secured area.






13. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






14. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






15. Hides inside other software - usually as an attachment or a downloadable file






16. Related to the perception - thought process - and understanding of the user.






17. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






18. People very knowledgeable about computers who use their knowledge to invade other people's computers






19. The weakness of passwords centers on ____.






20. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






21. Lock - conduit - card key - video equipment - secured guard






22. How many past backups you keep - what you did on your machine etc.






23. When DNS servers exchange information among themselves it is known as a ____.






24. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






25. A user under Role Based Access Control can be assigned only one ____.






26. A private key and public key






27. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






28. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






29. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






30. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






31. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






32. A commonly used technique by pornography sites where a user gets "locked" in a web site.






33. Viruses and worms are said to be self-____.






34. Sending high volumes of UDP requests to a target.






35. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






36. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






37. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






38. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






39. A variety of threats such as viruses - worms - and Trojan horses






40. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






41. Small electronic devices that change user passwords automatically






42. A program that is automatically downloaded to your computer without your consent or even your knowledge.






43. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






44. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






45. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






46. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






47. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






48. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






49. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






50. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)