Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These accounts are user accounts that remain active after an employee has left an organization.






2. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






3. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






4. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






5. A commonly used technique by pornography sites where a user gets "locked" in a web site.






6. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






7. Pretending to be another person.






8. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






9. It accepts spoken words for input as if they had been typed on the keyboard.






10. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






11. A form of filtering that blocks only sites specified as harmful.






12. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






13. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






14. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






15. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






16. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






17. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






18. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






19. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






20. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






21. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






22. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






23. Can be used to determine whether new IP addresses are attempting to probe the network.






24. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






25. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






26. Securing a restricted area by erecting a barrier is called ____.






27. A firewall capable of monitoring a data stream from end to end.






28. Often used for managing user access to one or more systems.






29. A program that is automatically downloaded to your computer without your consent or even your knowledge.






30. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






31. A group of piconets in which connections exist between different piconets is called a ____.






32. ____ involves horizontally separating words - although it is still readable by the human eye.






33. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






34. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






35. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






36. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






37. Password and BioMetric






38. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






39. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






40. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






41. Could become a key element in authentication in the future.






42. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






43. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






44. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






45. Below 70 degrees or above 75 degrees






46. A technology that can help to evenly distribute work across a network.






47. How secure the data in your backups is-can use physical security or encryption






48. A user accessing a computer system must present credentials or ____ when logging on to the system.






49. Hides inside other software - usually as an attachment or a downloadable file






50. A ____ means that the application or service assigned to that port is listening for any instructions.