Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






2. An attack that sends unsolicited messages to Bluetooth-enabled devices.






3. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






4. The set of letters - symbols - and characters that make up the password are known as a ____ set.






5. Securing a restricted area by erecting a barrier is called ____.






6. Form of phishing that targets wealthy individuals.






7. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






8. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






9. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






10. A framework for transporting authentication protocols instead of the authentication protocol itself.






11. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






12. ____ can be prewired for electrical power as well as wired network connections.






13. Sending high volumes of UDP requests to a target.






14. Users who access a Web server are usually restricted to the ____ directory.






15. Ensures that messages are not corrupt or tampered with






16. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






17. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






18. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






19. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






20. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






21. When organizations use software that filters content to prevent the transmission of unauthorized information






22. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






23. The geographical storage of your backups-safest place is a different place from where you keep your actual data






24. A ____ means that the application or service assigned to that port is listening for any instructions.






25. ____ is an image spam that is divided into multiple images.






26. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






27. To create a rainbow table - each ____ begins with an initial password that is encrypted.






28. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






29. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






30. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






31. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






32. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






33. Content filtering - encryption - firewalls






34. Holds the promise of reducing the number of usernames and passwords that users must memorize.






35. A program that is automatically downloaded to your computer without your consent or even your knowledge.






36. These attacks may allow an attacker to construct LDAP statements based on user input statements.






37. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






38. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






39. A ____ does not serve clients - but instead routes incoming requests to the correct server.






40. A set of permissions that are attached to an object.






41. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






42. A ____ encrypts all data that is transmitted between the remote device and the network.






43. These accounts are user accounts that remain active after an employee has left an organization.






44. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






45. The process of giving someone permission to do or have something






46. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






47. Computer crimes involving the theft of money






48. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






49. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






50. A firewall capable of monitoring a data stream from end to end.