Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer crimes involving the theft of money






2. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






3. It accepts spoken words for input as if they had been typed on the keyboard.






4. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






5. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






6. Forwards packets across computer networks.






7. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






8. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






9. A technique that allows private IP addresses to be used on the public Internet.






10. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






11. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






12. A threat that originates from outside the company. (ex. power failure.)






13. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






14. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






15. An attacker slips through a secure area following a legitimate employee.






16. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






17. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






18. Software that can guess passwords






19. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






20. An authentication process that involves three steps.






21. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






22. Sifting through a company's garbage to find information to help break into their computers






23. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






24. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






25. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






26. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






27. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






28. How many past backups you keep - what you did on your machine etc.






29. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






30. A security analysis of the transaction within its approved context.






31. Can create entries in a log for all queries that are received.






32. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






33. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






34. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






35. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






36. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






37. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






38. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






39. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






40. An attacker motivated by the ideology to attack computer or infrastructure networks.






41. Wants to cause as much damage as possible - without a particular target or goal.






42. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






43. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






44. Users who access a Web server are usually restricted to the ____ directory.






45. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






46. A method for confirming users' identities






47. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






48. Holds the promise of reducing the number of usernames and passwords that users must memorize.






49. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






50. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.