Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Password and BioMetric






2. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






3. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






4. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






5. Hides inside other software - usually as an attachment or a downloadable file






6. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






7. Can also capture transmissions that contain passwords.






8. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






9. A ____ virus infects the Master Boot Record of a hard disk drive.






10. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






11. An attack that sends unsolicited messages to Bluetooth-enabled devices.






12. Can be used to determine whether new IP addresses are attempting to probe the network.






13. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






14. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






15. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






16. An authentication process that involves three steps.






17. Wants to cause as much damage as possible - without a particular target or goal.






18. Form of phishing that targets wealthy individuals.






19. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






20. An attack that forces a user to unintentionally click a link.






21. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






22. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






23. Small electronic devices that change user passwords automatically






24. A user under Role Based Access Control can be assigned only one ____.






25. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






26. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






27. Could become a key element in authentication in the future.






28. A commonly used technique by pornography sites where a user gets "locked" in a web site.






29. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






30. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






31. Often used for managing user access to one or more systems.






32. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






33. Web application attacks are considered ____ attacks.






34. Requires mutual authentication used for WLAN encryption using Cisco client software.






35. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






36. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






37. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






38. A ____ attack is similar to a passive man-in-the-middle attack.






39. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






40. Below 40% or above 50%






41. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






42. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






43. Broadcast storms can be prevented with ____.






44. Indicates when an account is no longer active.






45. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






46. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






47. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






48. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






49. The weakness of passwords centers on ____.






50. Can create entries in a log for all queries that are received.