Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






2. Content filtering - encryption - firewalls






3. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






4. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






5. Sending high volumes of UDP requests to a target.






6. A ____ encrypts all data that is transmitted between the remote device and the network.






7. Computer crimes involving the theft of money






8. Lock - conduit - card key - video equipment - secured guard






9. Pretending to be another person.






10. Can be used to determine whether new IP addresses are attempting to probe the network.






11. These attacks may allow an attacker to construct LDAP statements based on user input statements.






12. ____ attacks are responsible for half of all malware delivered by Web advertising.






13. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






14. Provides a greater degree of security by implementing port-based authentication.






15. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






16. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






17. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






18. A technique that allows private IP addresses to be used on the public Internet.






19. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






20. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






21. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






22. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






23. Ensures that messages are not corrupt or tampered with






24. A ____ is a network set up with intentional vulnerabilities.






25. A threat that originates from outside the company. (ex. power failure.)






26. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






27. A user accessing a computer system must present credentials or ____ when logging on to the system.






28. Using a single authentication credential that is shared across multiple networks.






29. A variety of threats such as viruses - worms - and Trojan horses






30. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






31. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






32. A program that is automatically downloaded to your computer without your consent or even your knowledge.






33. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






34. Below 70 degrees or above 75 degrees






35. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






36. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






37. A security analysis of the transaction within its approved context.






38. ____ can be prewired for electrical power as well as wired network connections.






39. The set of letters - symbols - and characters that make up the password are known as a ____ set.






40. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






41. Small electronic devices that change user passwords automatically






42. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






43. When DNS servers exchange information among themselves it is known as a ____.






44. A firewall that can block designated types of traffic from entering a protected network.






45. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






46. Broadcast storms can be prevented with ____.






47. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






48. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






49. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






50. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.