Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






2. A technology that can help to evenly distribute work across a network.






3. Can also capture transmissions that contain passwords.






4. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






5. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






6. An attack that sends unsolicited messages to Bluetooth-enabled devices.






7. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






8. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






9. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






10. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






11. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






12. A pay-per-use computing model in which customers pay only for the computing resources they need.






13. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






14. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






15. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






16. Allows a single access point to service different types of users.






17. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






18. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






19. Sending high volumes of ICMP (usually ping) packets to a target.






20. Requires mutual authentication used for WLAN encryption using Cisco client software.






21. It accepts spoken words for input as if they had been typed on the keyboard.






22. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






23. Can create entries in a log for all queries that are received.






24. Below 70 degrees or above 75 degrees






25. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






26. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






27. Software that can guess passwords






28. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






29. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






30. A ____ attack is similar to a passive man-in-the-middle attack.






31. Floods a Web site with so many requests for service that it slows down or crashes the site






32. A ____ means that the application or service assigned to that port is listening for any instructions.






33. Using a single authentication credential that is shared across multiple networks.






34. A secret combination of letters - numbers - and/or characters that only the user should know.






35. Scrambles information into an alternative form that requires a key or password to decrypt the information






36. Often used for managing user access to one or more systems.






37. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






38. A ____ virus infects the Master Boot Record of a hard disk drive.






39. Indicates when an account is no longer active.






40. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






41. Holds the promise of reducing the number of usernames and passwords that users must memorize.






42. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






43. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






44. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






45. Wants to cause as much damage as possible - without a particular target or goal.






46. Below 40% or above 50%






47. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






48. The process of verifying that your backups actually work






49. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






50. The most restrictive access control model is ____.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests