Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ensures that messages are not corrupt or tampered with






2. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






3. Could become a key element in authentication in the future.






4. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






5. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






6. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






7. Allows a single access point to service different types of users.






8. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






9. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






10. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






11. Software that can guess passwords






12. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






13. Due to the limitations of online guessing - most password attacks today use ____.






14. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






15. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






16. Provides a greater degree of security by implementing port-based authentication.






17. Can be used to determine whether new IP addresses are attempting to probe the network.






18. Sending high volumes of UDP requests to a target.






19. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






20. People very knowledgeable about computers who use their knowledge to invade other people's computers






21. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






22. Sending high volumes of ICMP (usually ping) packets to a target.






23. A firewall that can block designated types of traffic from entering a protected network.






24. Computer crimes involving the theft of money






25. A set of permissions that are attached to an object.






26. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






27. A form of filtering that blocks only sites specified as harmful.






28. A private key and public key






29. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






30. The geographical storage of your backups-safest place is a different place from where you keep your actual data






31. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






32. An AP that is set up by an attacker.






33. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






34. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






35. The most restrictive access control model is ____.






36. A ____ virus infects the Master Boot Record of a hard disk drive.






37. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






38. Can also capture transmissions that contain passwords.






39. An attack that forces a user to unintentionally click a link.






40. An attacker slips through a secure area following a legitimate employee.






41. These accounts are user accounts that remain active after an employee has left an organization.






42. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






43. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






44. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






45. A user accessing a computer system must present credentials or ____ when logging on to the system.






46. How secure the data in your backups is-can use physical security or encryption






47. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






48. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






49. Using a single authentication credential that is shared across multiple networks.






50. A firewall capable of monitoring a data stream from end to end.