Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






2. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






3. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






4. A program that is automatically downloaded to your computer without your consent or even your knowledge.






5. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






6. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






7. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






8. A form of filtering that blocks only sites specified as harmful.






9. Using a single authentication credential that is shared across multiple networks.






10. The protection of information from accidental or intentional misuse by persons inside or outside an organization






11. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






12. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






13. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






14. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






15. When DNS servers exchange information among themselves it is known as a ____.






16. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






17. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






18. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






19. An attacker motivated by the ideology to attack computer or infrastructure networks.






20. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






21. Due to the limitations of online guessing - most password attacks today use ____.






22. It accepts spoken words for input as if they had been typed on the keyboard.






23. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






24. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






25. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






26. A variety of threats such as viruses - worms - and Trojan horses






27. A firewall capable of monitoring a data stream from end to end.






28. A user accessing a computer system must present credentials or ____ when logging on to the system.






29. ____ is an image spam that is divided into multiple images.






30. Computer crimes involving the theft of money






31. Fingerprints and patterns






32. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






33. Software that can guess passwords






34. An AP that is set up by an attacker.






35. The geographical storage of your backups-safest place is a different place from where you keep your actual data






36. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






37. Securing a restricted area by erecting a barrier is called ____.






38. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






39. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






40. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






41. It is able to code and decode data






42. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






43. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






44. A threat that originates from outside the company. (ex. power failure.)






45. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






46. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






47. A ____ does not serve clients - but instead routes incoming requests to the correct server.






48. A security analysis of the transaction within its approved context.






49. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






50. A ____ means that the application or service assigned to that port is listening for any instructions.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests