Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






2. An AP that is set up by an attacker.






3. A form of filtering that blocks only sites specified as harmful.






4. The most restrictive access control model is ____.






5. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






6. A ____ virus infects the Master Boot Record of a hard disk drive.






7. How many past backups you keep - what you did on your machine etc.






8. Below 70 degrees or above 75 degrees






9. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






10. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






11. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






12. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






13. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






14. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






15. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






16. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






17. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






18. Indicates when an account is no longer active.






19. Viruses and worms are said to be self-____.






20. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






21. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






22. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






23. A private key and public key






24. A ____ does not serve clients - but instead routes incoming requests to the correct server.






25. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






26. ____ attacks are responsible for half of all malware delivered by Web advertising.






27. Sifting through a company's garbage to find information to help break into their computers






28. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






29. A set of permissions that are attached to an object.






30. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






31. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






32. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






33. The action that is taken by the subject over the object is called a ____.






34. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






35. ____ is an image spam that is divided into multiple images.






36. Pretending to be another person.






37. ____ involves horizontally separating words - although it is still readable by the human eye.






38. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






39. An attack that sends unsolicited messages to Bluetooth-enabled devices.






40. How secure the data in your backups is-can use physical security or encryption






41. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






42. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






43. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






44. Holds the promise of reducing the number of usernames and passwords that users must memorize.






45. The geographical storage of your backups-safest place is a different place from where you keep your actual data






46. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






47. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






48. Scrambles information into an alternative form that requires a key or password to decrypt the information






49. Password and BioMetric






50. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests