Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






2. These attacks may allow an attacker to construct LDAP statements based on user input statements.






3. How many past backups you keep - what you did on your machine etc.






4. Hides inside other software - usually as an attachment or a downloadable file






5. The time it takes for a key to be pressed and then released.






6. These accounts are user accounts that remain active after an employee has left an organization.






7. A firewall capable of monitoring a data stream from end to end.






8. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






9. Requires mutual authentication used for WLAN encryption using Cisco client software.






10. An attacker slips through a secure area following a legitimate employee.






11. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






12. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






13. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






14. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






15. Scrambles information into an alternative form that requires a key or password to decrypt the information






16. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






17. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






18. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






19. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






20. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






21. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






22. ____ can be prewired for electrical power as well as wired network connections.






23. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






24. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






25. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






26. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






27. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






28. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






29. Holds the promise of reducing the number of usernames and passwords that users must memorize.






30. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






31. Using a single authentication credential that is shared across multiple networks.






32. A user under Role Based Access Control can be assigned only one ____.






33. An authentication process that involves three steps.






34. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






35. A private key and public key






36. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






37. It is able to code and decode data






38. A secret combination of letters - numbers - and/or characters that only the user should know.






39. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






40. An attacker motivated by the ideology to attack computer or infrastructure networks.






41. A ____ attack is similar to a passive man-in-the-middle attack.






42. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






43. The set of letters - symbols - and characters that make up the password are known as a ____ set.






44. Can be used to determine whether new IP addresses are attempting to probe the network.






45. A framework for transporting authentication protocols instead of the authentication protocol itself.






46. The ____ model is the least restrictive.






47. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






48. A technique for crashing by sending too much data to the buffer in a comuter's memory






49. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






50. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests