Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






2. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






3. The time it takes for a key to be pressed and then released.






4. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






5. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






6. Allows a single access point to service different types of users.






7. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






8. Below 70 degrees or above 75 degrees






9. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






10. People very knowledgeable about computers who use their knowledge to invade other people's computers






11. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






12. Ensures that messages are not corrupt or tampered with






13. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






14. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






15. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






16. A user accessing a computer system must present credentials or ____ when logging on to the system.






17. An attack that forces a user to unintentionally click a link.






18. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






19. A group of piconets in which connections exist between different piconets is called a ____.






20. Indicates when an account is no longer active.






21. A commonly used technique by pornography sites where a user gets "locked" in a web site.






22. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






23. Due to the limitations of online guessing - most password attacks today use ____.






24. A ____ virus infects the Master Boot Record of a hard disk drive.






25. A firewall capable of monitoring a data stream from end to end.






26. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






27. Web application attacks are considered ____ attacks.






28. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






29. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






30. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






31. It is able to code and decode data






32. A ____ encrypts all data that is transmitted between the remote device and the network.






33. An authentication process that involves three steps.






34. A variety of threats such as viruses - worms - and Trojan horses






35. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






36. An attacker slips through a secure area following a legitimate employee.






37. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






38. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






39. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






40. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






41. A security analysis of the transaction within its approved context.






42. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






43. An attacker motivated by the ideology to attack computer or infrastructure networks.






44. An attack that sends unsolicited messages to Bluetooth-enabled devices.






45. A secret combination of letters - numbers - and/or characters that only the user should know.






46. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






47. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






48. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






49. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






50. ____ involves horizontally separating words - although it is still readable by the human eye.