Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The action that is taken by the subject over the object is called a ____.






2. A ____ encrypts all data that is transmitted between the remote device and the network.






3. People very knowledgeable about computers who use their knowledge to invade other people's computers






4. The time it takes for a key to be pressed and then released.






5. A group of piconets in which connections exist between different piconets is called a ____.






6. ____ can be prewired for electrical power as well as wired network connections.






7. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






8. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






9. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






10. Wants to cause as much damage as possible - without a particular target or goal.






11. The most restrictive access control model is ____.






12. A ____ virus infects the Master Boot Record of a hard disk drive.






13. Four interrelated aspects to _________:Access - data - infrastructure - computers






14. A technique for crashing by sending too much data to the buffer in a comuter's memory






15. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






16. The protection of information from accidental or intentional misuse by persons inside or outside an organization






17. A threat that originates from outside the company. (ex. power failure.)






18. Can also capture transmissions that contain passwords.






19. ____ involves horizontally separating words - although it is still readable by the human eye.






20. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






21. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






22. Pretending to be another person.






23. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






24. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






25. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






26. Form of phishing that targets wealthy individuals.






27. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






28. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






29. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






30. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






31. Floods a Web site with so many requests for service that it slows down or crashes the site






32. Password and BioMetric






33. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






34. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






35. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






36. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






37. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






38. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






39. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






40. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






41. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






42. How many past backups you keep - what you did on your machine etc.






43. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






44. The set of letters - symbols - and characters that make up the password are known as a ____ set.






45. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






46. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






47. Web application attacks are considered ____ attacks.






48. A private key and public key






49. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






50. Scrambles information into an alternative form that requires a key or password to decrypt the information







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests