Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






2. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






3. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






4. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






5. A user under Role Based Access Control can be assigned only one ____.






6. People very knowledgeable about computers who use their knowledge to invade other people's computers






7. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






8. Password and BioMetric






9. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






10. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






11. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






12. A means of managing and presenting computer resources by function without regard to their physical layout or location.






13. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






14. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






15. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






16. The weakness of passwords centers on ____.






17. Could become a key element in authentication in the future.






18. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






19. Software that can guess passwords






20. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






21. A framework for transporting authentication protocols instead of the authentication protocol itself.






22. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






23. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






24. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






25. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






26. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






27. A technique for crashing by sending too much data to the buffer in a comuter's memory






28. Indicates when an account is no longer active.






29. It is able to code and decode data






30. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






31. ____ attacks are responsible for half of all malware delivered by Web advertising.






32. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






33. Can be used to determine whether new IP addresses are attempting to probe the network.






34. Content filtering - encryption - firewalls






35. How secure the data in your backups is-can use physical security or encryption






36. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






37. These attacks may allow an attacker to construct LDAP statements based on user input statements.






38. Scrambles information into an alternative form that requires a key or password to decrypt the information






39. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






40. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






41. Fingerprints and patterns






42. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






43. The most restrictive access control model is ____.






44. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






45. A program that is automatically downloaded to your computer without your consent or even your knowledge.






46. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






47. Pretending to be another person.






48. An attacker motivated by the ideology to attack computer or infrastructure networks.






49. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






50. A group of piconets in which connections exist between different piconets is called a ____.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests