Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






2. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






3. To create a rainbow table - each ____ begins with an initial password that is encrypted.






4. Using a single authentication credential that is shared across multiple networks.






5. A pay-per-use computing model in which customers pay only for the computing resources they need.






6. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






7. A ____ is a network set up with intentional vulnerabilities.






8. Holds the promise of reducing the number of usernames and passwords that users must memorize.






9. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






10. ____ can be prewired for electrical power as well as wired network connections.






11. A ____ is designed to separate a nonsecured area from a secured area.






12. A method for confirming users' identities






13. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






14. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






15. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






16. Hides inside other software - usually as an attachment or a downloadable file






17. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






18. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






19. A variety of threats such as viruses - worms - and Trojan horses






20. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






21. Ensures that messages are not corrupt or tampered with






22. An authentication process that involves three steps.






23. The action that is taken by the subject over the object is called a ____.






24. These attacks may allow an attacker to construct LDAP statements based on user input statements.






25. Sending high volumes of UDP requests to a target.






26. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






27. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






28. Can be used to determine whether new IP addresses are attempting to probe the network.






29. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






30. Computer crimes involving the theft of money






31. A private key and public key






32. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






33. An attacker motivated by the ideology to attack computer or infrastructure networks.






34. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






35. A firewall capable of monitoring a data stream from end to end.






36. The weakness of passwords centers on ____.






37. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






38. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






39. A technology that can help to evenly distribute work across a network.






40. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






41. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






42. The geographical storage of your backups-safest place is a different place from where you keep your actual data






43. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






44. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






45. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






46. People very knowledgeable about computers who use their knowledge to invade other people's computers






47. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






48. Web application attacks are considered ____ attacks.






49. Often used for managing user access to one or more systems.






50. ____ is an image spam that is divided into multiple images.