Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Users who access a Web server are usually restricted to the ____ directory.






2. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






3. Below 40% or above 50%






4. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






5. The process of giving someone permission to do or have something






6. Forwards packets across computer networks.






7. The set of letters - symbols - and characters that make up the password are known as a ____ set.






8. When organizations use software that filters content to prevent the transmission of unauthorized information






9. An attacker slips through a secure area following a legitimate employee.






10. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






11. People very knowledgeable about computers who use their knowledge to invade other people's computers






12. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






13. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






14. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






15. Password and BioMetric






16. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






17. A ____ means that the application or service assigned to that port is listening for any instructions.






18. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






19. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






20. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






21. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






22. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






23. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






24. Sifting through a company's garbage to find information to help break into their computers






25. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






26. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






27. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






28. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






29. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






30. Allows a single access point to service different types of users.






31. Wants to cause as much damage as possible - without a particular target or goal.






32. ____ is an image spam that is divided into multiple images.






33. An attacker motivated by the ideology to attack computer or infrastructure networks.






34. Ensures that messages are not corrupt or tampered with






35. Requires mutual authentication used for WLAN encryption using Cisco client software.






36. A private key and public key






37. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






38. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






39. An AP that is set up by an attacker.






40. A group of piconets in which connections exist between different piconets is called a ____.






41. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






42. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






43. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






44. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






45. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






46. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






47. A user accessing a computer system must present credentials or ____ when logging on to the system.






48. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






49. The process of verifying that your backups actually work






50. The action that is taken by the subject over the object is called a ____.