Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






2. Often used for managing user access to one or more systems.






3. Can be used to determine whether new IP addresses are attempting to probe the network.






4. Web application attacks are considered ____ attacks.






5. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






6. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






7. Holds the promise of reducing the number of usernames and passwords that users must memorize.






8. The process of giving someone permission to do or have something






9. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






10. The process of verifying that your backups actually work






11. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






12. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






13. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






14. Four interrelated aspects to _________:Access - data - infrastructure - computers






15. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






16. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






17. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






18. These accounts are user accounts that remain active after an employee has left an organization.






19. A group of piconets in which connections exist between different piconets is called a ____.






20. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






21. An attack that sends unsolicited messages to Bluetooth-enabled devices.






22. ____ can be prewired for electrical power as well as wired network connections.






23. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






24. Due to the limitations of online guessing - most password attacks today use ____.






25. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






26. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






27. The time it takes for a key to be pressed and then released.






28. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






29. Below 70 degrees or above 75 degrees






30. An attack that forces a user to unintentionally click a link.






31. Broadcast storms can be prevented with ____.






32. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






33. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






34. A secret combination of letters - numbers - and/or characters that only the user should know.






35. Indicates when an account is no longer active.






36. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






37. ____ attacks are responsible for half of all malware delivered by Web advertising.






38. Forwards packets across computer networks.






39. A ____ does not serve clients - but instead routes incoming requests to the correct server.






40. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






41. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






42. Content filtering - encryption - firewalls






43. When organizations use software that filters content to prevent the transmission of unauthorized information






44. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






45. Hides inside other software - usually as an attachment or a downloadable file






46. A pay-per-use computing model in which customers pay only for the computing resources they need.






47. These attacks may allow an attacker to construct LDAP statements based on user input statements.






48. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






49. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






50. ____ is an image spam that is divided into multiple images.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests