Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






2. These accounts are user accounts that remain active after an employee has left an organization.






3. A ____ encrypts all data that is transmitted between the remote device and the network.






4. Wants to cause as much damage as possible - without a particular target or goal.






5. Forwards packets across computer networks.






6. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






7. Web application attacks are considered ____ attacks.






8. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






9. ____ is an image spam that is divided into multiple images.






10. Form of phishing that targets wealthy individuals.






11. A pay-per-use computing model in which customers pay only for the computing resources they need.






12. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






13. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






14. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






15. Content filtering - encryption - firewalls






16. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






17. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






18. A technique for crashing by sending too much data to the buffer in a comuter's memory






19. An attack that sends unsolicited messages to Bluetooth-enabled devices.






20. A ____ is designed to separate a nonsecured area from a secured area.






21. Can be used to determine whether new IP addresses are attempting to probe the network.






22. Computer crimes involving the theft of money






23. Below 40% or above 50%






24. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






25. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






26. An attacker motivated by the ideology to attack computer or infrastructure networks.






27. A security analysis of the transaction within its approved context.






28. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






29. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






30. Fingerprints and patterns






31. The most restrictive access control model is ____.






32. A secret combination of letters - numbers - and/or characters that only the user should know.






33. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






34. Sending high volumes of UDP requests to a target.






35. Password and BioMetric






36. A ____ means that the application or service assigned to that port is listening for any instructions.






37. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






38. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






39. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






40. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






41. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






42. Broadcast storms can be prevented with ____.






43. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






44. When organizations use software that filters content to prevent the transmission of unauthorized information






45. Software that can guess passwords






46. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






47. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






48. Scrambles information into an alternative form that requires a key or password to decrypt the information






49. It is able to code and decode data






50. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.