Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






2. ____ involves horizontally separating words - although it is still readable by the human eye.






3. A threat that originates from outside the company. (ex. power failure.)






4. Allows a single access point to service different types of users.






5. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






6. Securing a restricted area by erecting a barrier is called ____.






7. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






8. Ensures that messages are not corrupt or tampered with






9. A private key and public key






10. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






11. A ____ attack is similar to a passive man-in-the-middle attack.






12. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






13. A program that is automatically downloaded to your computer without your consent or even your knowledge.






14. An attack that forces a user to unintentionally click a link.






15. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






16. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






17. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






18. A means of managing and presenting computer resources by function without regard to their physical layout or location.






19. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






20. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






21. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






22. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






23. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






24. A ____ means that the application or service assigned to that port is listening for any instructions.






25. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






26. A firewall that can block designated types of traffic from entering a protected network.






27. ____ attacks are responsible for half of all malware delivered by Web advertising.






28. Computer crimes involving the theft of money






29. A technology that can help to evenly distribute work across a network.






30. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






31. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






32. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






33. Floods a Web site with so many requests for service that it slows down or crashes the site






34. Using a single authentication credential that is shared across multiple networks.






35. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






36. A commonly used technique by pornography sites where a user gets "locked" in a web site.






37. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






38. The action that is taken by the subject over the object is called a ____.






39. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






40. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






41. A user accessing a computer system must present credentials or ____ when logging on to the system.






42. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






43. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






44. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






45. The geographical storage of your backups-safest place is a different place from where you keep your actual data






46. Wants to cause as much damage as possible - without a particular target or goal.






47. Below 40% or above 50%






48. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






49. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






50. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.