Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






2. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






3. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






4. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






5. When organizations use software that filters content to prevent the transmission of unauthorized information






6. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






7. Can be used to determine whether new IP addresses are attempting to probe the network.






8. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






9. Indicates when an account is no longer active.






10. ____ involves horizontally separating words - although it is still readable by the human eye.






11. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






12. It accepts spoken words for input as if they had been typed on the keyboard.






13. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






14. Password and BioMetric






15. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






16. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






17. A form of filtering that blocks only sites specified as harmful.






18. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






19. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






20. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






21. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






22. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






23. Floods a Web site with so many requests for service that it slows down or crashes the site






24. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






25. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






26. Due to the limitations of online guessing - most password attacks today use ____.






27. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






28. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






29. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






30. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






31. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






32. Using a single authentication credential that is shared across multiple networks.






33. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






34. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






35. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






36. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






37. An attack that sends unsolicited messages to Bluetooth-enabled devices.






38. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






39. A means of managing and presenting computer resources by function without regard to their physical layout or location.






40. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






41. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






42. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






43. An attack that forces a user to unintentionally click a link.






44. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






45. The process of verifying that your backups actually work






46. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






47. A program that is automatically downloaded to your computer without your consent or even your knowledge.






48. A user under Role Based Access Control can be assigned only one ____.






49. The time it takes for a key to be pressed and then released.






50. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.