Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How often you perform your backups (cost-benefit analysis of backing up)






2. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






3. Password and BioMetric






4. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






5. A ____ does not serve clients - but instead routes incoming requests to the correct server.






6. Sending high volumes of UDP requests to a target.






7. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






8. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






9. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






10. Ensures that messages are not corrupt or tampered with






11. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






12. When organizations use software that filters content to prevent the transmission of unauthorized information






13. Scrambles information into an alternative form that requires a key or password to decrypt the information






14. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






15. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






16. These attacks may allow an attacker to construct LDAP statements based on user input statements.






17. Floods a Web site with so many requests for service that it slows down or crashes the site






18. Small electronic devices that change user passwords automatically






19. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






20. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






21. Form of phishing that targets wealthy individuals.






22. Software that can guess passwords






23. Viruses and worms are said to be self-____.






24. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






25. Provides a greater degree of security by implementing port-based authentication.






26. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






27. A security analysis of the transaction within its approved context.






28. The action that is taken by the subject over the object is called a ____.






29. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






30. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






31. A program that is automatically downloaded to your computer without your consent or even your knowledge.






32. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






33. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






34. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






35. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






36. Could become a key element in authentication in the future.






37. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






38. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






39. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






40. When DNS servers exchange information among themselves it is known as a ____.






41. It is able to code and decode data






42. Fingerprints and patterns






43. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






44. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






45. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






46. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






47. A user under Role Based Access Control can be assigned only one ____.






48. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






49. Lock - conduit - card key - video equipment - secured guard






50. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.