Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






2. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






3. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






4. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






5. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






6. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






7. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






8. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






9. An attack that sends unsolicited messages to Bluetooth-enabled devices.






10. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






11. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






12. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






13. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






14. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






15. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






16. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






17. Holds the promise of reducing the number of usernames and passwords that users must memorize.






18. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






19. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






20. Floods a Web site with so many requests for service that it slows down or crashes the site






21. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






22. Below 40% or above 50%






23. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






24. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






25. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






26. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






27. A ____ is designed to separate a nonsecured area from a secured area.






28. Viruses and worms are said to be self-____.






29. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






30. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






31. An attack that sends unsolicited messages to Bluetooth-enabled devices.






32. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






33. Web application attacks are considered ____ attacks.






34. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






35. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






36. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






37. Using a single authentication credential that is shared across multiple networks.






38. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






39. Password and BioMetric






40. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






41. A ____ does not serve clients - but instead routes incoming requests to the correct server.






42. It accepts spoken words for input as if they had been typed on the keyboard.






43. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






44. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






45. A set of permissions that are attached to an object.






46. A program that is automatically downloaded to your computer without your consent or even your knowledge.






47. A group of piconets in which connections exist between different piconets is called a ____.






48. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






49. Fingerprints and patterns






50. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.