Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






2. A ____ attack is similar to a passive man-in-the-middle attack.






3. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






4. An attack that forces a user to unintentionally click a link.






5. An AP that is set up by an attacker.






6. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






7. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






8. A ____ encrypts all data that is transmitted between the remote device and the network.






9. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






10. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






11. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






12. The ____ model is the least restrictive.






13. The set of letters - symbols - and characters that make up the password are known as a ____ set.






14. Ensures that messages are not corrupt or tampered with






15. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






16. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






17. Due to the limitations of online guessing - most password attacks today use ____.






18. Viruses and worms are said to be self-____.






19. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






20. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






21. The action that is taken by the subject over the object is called a ____.






22. Set of rules that allow or deny traffic






23. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






24. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






25. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






26. A group of piconets in which connections exist between different piconets is called a ____.






27. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






28. A firewall that can block designated types of traffic from entering a protected network.






29. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






30. When organizations use software that filters content to prevent the transmission of unauthorized information






31. The time it takes for a key to be pressed and then released.






32. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






33. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






34. A commonly used technique by pornography sites where a user gets "locked" in a web site.






35. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






36. An attack that sends unsolicited messages to Bluetooth-enabled devices.






37. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






38. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






39. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






40. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






41. A ____ virus infects the Master Boot Record of a hard disk drive.






42. Wants to cause as much damage as possible - without a particular target or goal.






43. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






44. A ____ is a network set up with intentional vulnerabilities.






45. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






46. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






47. An attacker motivated by the ideology to attack computer or infrastructure networks.






48. ____ can be prewired for electrical power as well as wired network connections.






49. A security analysis of the transaction within its approved context.






50. ____ is an image spam that is divided into multiple images.