Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






2. A ____ does not serve clients - but instead routes incoming requests to the correct server.






3. ____ attacks are responsible for half of all malware delivered by Web advertising.






4. An AP that is set up by an attacker.






5. The ____ model is the least restrictive.






6. Indicates when an account is no longer active.






7. These attacks may allow an attacker to construct LDAP statements based on user input statements.






8. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






9. A secret combination of letters - numbers - and/or characters that only the user should know.






10. A firewall that can block designated types of traffic from entering a protected network.






11. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






12. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






13. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






14. Floods a Web site with so many requests for service that it slows down or crashes the site






15. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






16. A form of filtering that blocks only sites specified as harmful.






17. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






18. ____ is an image spam that is divided into multiple images.






19. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






20. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






21. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






22. People very knowledgeable about computers who use their knowledge to invade other people's computers






23. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






24. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






25. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






26. A set of permissions that are attached to an object.






27. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






28. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






29. A technique that allows private IP addresses to be used on the public Internet.






30. To create a rainbow table - each ____ begins with an initial password that is encrypted.






31. Set of rules that allow or deny traffic






32. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






33. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






34. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






35. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






36. A means of managing and presenting computer resources by function without regard to their physical layout or location.






37. How many past backups you keep - what you did on your machine etc.






38. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






39. An authentication process that involves three steps.






40. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






41. The most restrictive access control model is ____.






42. Four interrelated aspects to _________:Access - data - infrastructure - computers






43. Ensures that messages are not corrupt or tampered with






44. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






45. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






46. Content filtering - encryption - firewalls






47. Using a single authentication credential that is shared across multiple networks.






48. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






49. The set of letters - symbols - and characters that make up the password are known as a ____ set.






50. The act of driving while running a laptop configured to detect and capture wireless data transmissions.