Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






2. ____ is an image spam that is divided into multiple images.






3. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






4. A means of managing and presenting computer resources by function without regard to their physical layout or location.






5. A group of piconets in which connections exist between different piconets is called a ____.






6. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






7. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






8. To create a rainbow table - each ____ begins with an initial password that is encrypted.






9. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






10. Sifting through a company's garbage to find information to help break into their computers






11. An attack that sends unsolicited messages to Bluetooth-enabled devices.






12. A ____ encrypts all data that is transmitted between the remote device and the network.






13. A pay-per-use computing model in which customers pay only for the computing resources they need.






14. Web application attacks are considered ____ attacks.






15. Requires mutual authentication used for WLAN encryption using Cisco client software.






16. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






17. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






18. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






19. ____ attacks are responsible for half of all malware delivered by Web advertising.






20. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






21. The most restrictive access control model is ____.






22. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






23. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






24. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






25. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






26. Users who access a Web server are usually restricted to the ____ directory.






27. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






28. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






29. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






30. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






31. It accepts spoken words for input as if they had been typed on the keyboard.






32. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






33. The geographical storage of your backups-safest place is a different place from where you keep your actual data






34. An attack that forces a user to unintentionally click a link.






35. A ____ is designed to separate a nonsecured area from a secured area.






36. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






37. ____ can be prewired for electrical power as well as wired network connections.






38. The weakness of passwords centers on ____.






39. Could become a key element in authentication in the future.






40. A security analysis of the transaction within its approved context.






41. Fingerprints and patterns






42. People very knowledgeable about computers who use their knowledge to invade other people's computers






43. Using a single authentication credential that is shared across multiple networks.






44. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






45. Forwards packets across computer networks.






46. A set of permissions that are attached to an object.






47. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






48. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






49. Password and BioMetric






50. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.