Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ____ does not serve clients - but instead routes incoming requests to the correct server.






2. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






3. A commonly used technique by pornography sites where a user gets "locked" in a web site.






4. A ____ means that the application or service assigned to that port is listening for any instructions.






5. When DNS servers exchange information among themselves it is known as a ____.






6. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






7. Can be used to determine whether new IP addresses are attempting to probe the network.






8. Wants to cause as much damage as possible - without a particular target or goal.






9. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






10. Ensures that messages are not corrupt or tampered with






11. An authentication process that involves three steps.






12. Indicates when an account is no longer active.






13. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






14. A technique for crashing by sending too much data to the buffer in a comuter's memory






15. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






16. The protection of information from accidental or intentional misuse by persons inside or outside an organization






17. Forwards packets across computer networks.






18. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






19. Broadcast storms can be prevented with ____.






20. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






21. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






22. Set of rules that allow or deny traffic






23. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






24. A method for confirming users' identities






25. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






26. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






27. Often used for managing user access to one or more systems.






28. Fingerprints and patterns






29. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






30. An AP that is set up by an attacker.






31. Password and BioMetric






32. An attack that sends unsolicited messages to Bluetooth-enabled devices.






33. It accepts spoken words for input as if they had been typed on the keyboard.






34. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






35. A ____ is designed to separate a nonsecured area from a secured area.






36. How many past backups you keep - what you did on your machine etc.






37. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






38. Holds the promise of reducing the number of usernames and passwords that users must memorize.






39. ____ attacks are responsible for half of all malware delivered by Web advertising.






40. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






41. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






42. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






43. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






44. Securing a restricted area by erecting a barrier is called ____.






45. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






46. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






47. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






48. The geographical storage of your backups-safest place is a different place from where you keep your actual data






49. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






50. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests