Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An AP that is set up by an attacker.






2. A technology that can help to evenly distribute work across a network.






3. A ____ does not serve clients - but instead routes incoming requests to the correct server.






4. Holds the promise of reducing the number of usernames and passwords that users must memorize.






5. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






6. ____ attacks are responsible for half of all malware delivered by Web advertising.






7. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






8. It is able to code and decode data






9. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






10. How often you perform your backups (cost-benefit analysis of backing up)






11. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






12. A form of filtering that blocks only sites specified as harmful.






13. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






14. Content filtering - encryption - firewalls






15. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






16. Below 70 degrees or above 75 degrees






17. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






18. A pay-per-use computing model in which customers pay only for the computing resources they need.






19. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






20. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






21. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






22. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






23. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






24. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






25. A ____ means that the application or service assigned to that port is listening for any instructions.






26. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






27. Scrambles information into an alternative form that requires a key or password to decrypt the information






28. Lock - conduit - card key - video equipment - secured guard






29. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






30. A framework for transporting authentication protocols instead of the authentication protocol itself.






31. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






32. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






33. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






34. Set of rules that allow or deny traffic






35. Pretending to be another person.






36. Broadcast storms can be prevented with ____.






37. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






38. How many past backups you keep - what you did on your machine etc.






39. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






40. Sifting through a company's garbage to find information to help break into their computers






41. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






42. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






43. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






44. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






45. ____ can be prewired for electrical power as well as wired network connections.






46. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






47. A method for confirming users' identities






48. Password and BioMetric






49. A technique that allows private IP addresses to be used on the public Internet.






50. The process of verifying that your backups actually work







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests