Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The time it takes for a key to be pressed and then released.






2. The protection of information from accidental or intentional misuse by persons inside or outside an organization






3. Hides inside other software - usually as an attachment or a downloadable file






4. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






5. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






6. A technology that can help to evenly distribute work across a network.






7. A program that is automatically downloaded to your computer without your consent or even your knowledge.






8. A set of permissions that are attached to an object.






9. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






10. How many past backups you keep - what you did on your machine etc.






11. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






12. Provides a greater degree of security by implementing port-based authentication.






13. A framework for transporting authentication protocols instead of the authentication protocol itself.






14. The ____ model is the least restrictive.






15. It accepts spoken words for input as if they had been typed on the keyboard.






16. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






17. Content filtering - encryption - firewalls






18. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






19. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






20. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






21. It is able to code and decode data






22. ____ involves horizontally separating words - although it is still readable by the human eye.






23. An attack that forces a user to unintentionally click a link.






24. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






25. A form of filtering that blocks only sites specified as harmful.






26. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






27. These accounts are user accounts that remain active after an employee has left an organization.






28. Form of phishing that targets wealthy individuals.






29. Lock - conduit - card key - video equipment - secured guard






30. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






31. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






32. Small electronic devices that change user passwords automatically






33. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






34. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






35. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






36. Can also capture transmissions that contain passwords.






37. The action that is taken by the subject over the object is called a ____.






38. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






39. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






40. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






41. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






42. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






43. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






44. When DNS servers exchange information among themselves it is known as a ____.






45. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






46. Floods a Web site with so many requests for service that it slows down or crashes the site






47. A ____ means that the application or service assigned to that port is listening for any instructions.






48. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






49. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






50. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.