Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ____ is a network set up with intentional vulnerabilities.






2. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






3. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






4. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






5. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






6. These attacks may allow an attacker to construct LDAP statements based on user input statements.






7. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






8. When organizations use software that filters content to prevent the transmission of unauthorized information






9. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






10. People very knowledgeable about computers who use their knowledge to invade other people's computers






11. Form of phishing that targets wealthy individuals.






12. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






13. Hides inside other software - usually as an attachment or a downloadable file






14. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






15. A framework for transporting authentication protocols instead of the authentication protocol itself.






16. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






17. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






18. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






19. The action that is taken by the subject over the object is called a ____.






20. A set of permissions that are attached to an object.






21. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






22. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






23. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






24. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






25. Related to the perception - thought process - and understanding of the user.






26. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






27. These accounts are user accounts that remain active after an employee has left an organization.






28. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






29. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






30. Four interrelated aspects to _________:Access - data - infrastructure - computers






31. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






32. The process of giving someone permission to do or have something






33. The weakness of passwords centers on ____.






34. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






35. A ____ encrypts all data that is transmitted between the remote device and the network.






36. Small electronic devices that change user passwords automatically






37. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






38. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






39. An AP that is set up by an attacker.






40. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






41. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






42. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






43. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






44. Sending high volumes of UDP requests to a target.






45. An attack that forces a user to unintentionally click a link.






46. Using a single authentication credential that is shared across multiple networks.






47. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






48. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






49. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






50. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e