Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A firewall capable of monitoring a data stream from end to end.






2. The ____ model is the least restrictive.






3. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






4. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






5. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






6. Fingerprints and patterns






7. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






8. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






9. Indicates when an account is no longer active.






10. An AP that is set up by an attacker.






11. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






12. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






13. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






14. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






15. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






16. A framework for transporting authentication protocols instead of the authentication protocol itself.






17. ____ involves horizontally separating words - although it is still readable by the human eye.






18. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






19. How many past backups you keep - what you did on your machine etc.






20. When organizations use software that filters content to prevent the transmission of unauthorized information






21. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






22. Hides inside other software - usually as an attachment or a downloadable file






23. Wants to cause as much damage as possible - without a particular target or goal.






24. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






25. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






26. A technique for crashing by sending too much data to the buffer in a comuter's memory






27. The time it takes for a key to be pressed and then released.






28. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






29. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






30. Viruses and worms are said to be self-____.






31. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






32. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






33. An attacker motivated by the ideology to attack computer or infrastructure networks.






34. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






35. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






36. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






37. Related to the perception - thought process - and understanding of the user.






38. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






39. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






40. Holds the promise of reducing the number of usernames and passwords that users must memorize.






41. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






42. An attack that forces a user to unintentionally click a link.






43. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






44. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






45. ____ attacks are responsible for half of all malware delivered by Web advertising.






46. A method for confirming users' identities






47. The weakness of passwords centers on ____.






48. Allows a single access point to service different types of users.






49. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






50. A private key and public key