Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To create a rainbow table - each ____ begins with an initial password that is encrypted.






2. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






3. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






4. Broadcast storms can be prevented with ____.






5. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






6. Provides a greater degree of security by implementing port-based authentication.






7. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






8. Holds the promise of reducing the number of usernames and passwords that users must memorize.






9. How secure the data in your backups is-can use physical security or encryption






10. An attack that sends unsolicited messages to Bluetooth-enabled devices.






11. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






12. ____ involves horizontally separating words - although it is still readable by the human eye.






13. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






14. A technique that allows private IP addresses to be used on the public Internet.






15. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






16. A ____ means that the application or service assigned to that port is listening for any instructions.






17. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






18. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






19. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






20. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






21. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






22. Users who access a Web server are usually restricted to the ____ directory.






23. Lock - conduit - card key - video equipment - secured guard






24. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






25. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






26. The action that is taken by the subject over the object is called a ____.






27. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






28. The protection of information from accidental or intentional misuse by persons inside or outside an organization






29. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






30. When organizations use software that filters content to prevent the transmission of unauthorized information






31. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






32. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






33. Related to the perception - thought process - and understanding of the user.






34. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






35. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






36. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






37. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






38. How often you perform your backups (cost-benefit analysis of backing up)






39. The geographical storage of your backups-safest place is a different place from where you keep your actual data






40. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






41. An attacker motivated by the ideology to attack computer or infrastructure networks.






42. A security analysis of the transaction within its approved context.






43. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






44. A user under Role Based Access Control can be assigned only one ____.






45. The time it takes for a key to be pressed and then released.






46. Can also capture transmissions that contain passwords.






47. The process of verifying that your backups actually work






48. A user accessing a computer system must present credentials or ____ when logging on to the system.






49. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






50. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests