Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These attacks may allow an attacker to construct LDAP statements based on user input statements.






2. A ____ encrypts all data that is transmitted between the remote device and the network.






3. Floods a Web site with so many requests for service that it slows down or crashes the site






4. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






5. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






6. The set of letters - symbols - and characters that make up the password are known as a ____ set.






7. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






8. How many past backups you keep - what you did on your machine etc.






9. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






10. A user under Role Based Access Control can be assigned only one ____.






11. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






12. Computer crimes involving the theft of money






13. Provides a greater degree of security by implementing port-based authentication.






14. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






15. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






16. When organizations use software that filters content to prevent the transmission of unauthorized information






17. The most restrictive access control model is ____.






18. A method for confirming users' identities






19. It accepts spoken words for input as if they had been typed on the keyboard.






20. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






21. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






22. Users who access a Web server are usually restricted to the ____ directory.






23. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






24. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






25. These accounts are user accounts that remain active after an employee has left an organization.






26. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






27. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






28. The process of verifying that your backups actually work






29. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






30. A ____ means that the application or service assigned to that port is listening for any instructions.






31. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






32. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






33. How often you perform your backups (cost-benefit analysis of backing up)






34. A firewall that can block designated types of traffic from entering a protected network.






35. A technique that allows private IP addresses to be used on the public Internet.






36. Can be used to determine whether new IP addresses are attempting to probe the network.






37. Hides inside other software - usually as an attachment or a downloadable file






38. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






39. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






40. A variety of threats such as viruses - worms - and Trojan horses






41. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






42. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






43. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






44. A program that is automatically downloaded to your computer without your consent or even your knowledge.






45. Securing a restricted area by erecting a barrier is called ____.






46. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






47. A group of piconets in which connections exist between different piconets is called a ____.






48. Viruses and worms are said to be self-____.






49. An attack that forces a user to unintentionally click a link.






50. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.