Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






2. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






3. Software that can guess passwords






4. The process of verifying that your backups actually work






5. A security analysis of the transaction within its approved context.






6. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






7. Provides a greater degree of security by implementing port-based authentication.






8. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






9. The time it takes for a key to be pressed and then released.






10. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






11. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






12. A means of managing and presenting computer resources by function without regard to their physical layout or location.






13. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






14. An attack that sends unsolicited messages to Bluetooth-enabled devices.






15. Web application attacks are considered ____ attacks.






16. An attacker slips through a secure area following a legitimate employee.






17. Could become a key element in authentication in the future.






18. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






19. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






20. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






21. Hides inside other software - usually as an attachment or a downloadable file






22. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






23. These accounts are user accounts that remain active after an employee has left an organization.






24. A ____ encrypts all data that is transmitted between the remote device and the network.






25. ____ attacks are responsible for half of all malware delivered by Web advertising.






26. To create a rainbow table - each ____ begins with an initial password that is encrypted.






27. Wants to cause as much damage as possible - without a particular target or goal.






28. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






29. Below 70 degrees or above 75 degrees






30. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






31. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






32. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






33. Can also capture transmissions that contain passwords.






34. An attack that sends unsolicited messages to Bluetooth-enabled devices.






35. Can create entries in a log for all queries that are received.






36. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






37. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






38. Below 40% or above 50%






39. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






40. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






41. Users who access a Web server are usually restricted to the ____ directory.






42. A commonly used technique by pornography sites where a user gets "locked" in a web site.






43. The weakness of passwords centers on ____.






44. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






45. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






46. Using a single authentication credential that is shared across multiple networks.






47. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






48. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






49. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






50. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.