Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Below 40% or above 50%






2. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






3. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






4. An attack that sends unsolicited messages to Bluetooth-enabled devices.






5. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






6. The set of letters - symbols - and characters that make up the password are known as a ____ set.






7. A ____ means that the application or service assigned to that port is listening for any instructions.






8. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






9. Using a single authentication credential that is shared across multiple networks.






10. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






11. People very knowledgeable about computers who use their knowledge to invade other people's computers






12. The process of giving someone permission to do or have something






13. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






14. Can be used to determine whether new IP addresses are attempting to probe the network.






15. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






16. Wants to cause as much damage as possible - without a particular target or goal.






17. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






18. These accounts are user accounts that remain active after an employee has left an organization.






19. A firewall that can block designated types of traffic from entering a protected network.






20. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






21. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






22. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






23. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






24. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






25. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






26. A firewall capable of monitoring a data stream from end to end.






27. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






28. Content filtering - encryption - firewalls






29. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






30. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






31. A private key and public key






32. Lock - conduit - card key - video equipment - secured guard






33. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






34. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






35. How many past backups you keep - what you did on your machine etc.






36. A ____ is designed to separate a nonsecured area from a secured area.






37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






38. The process of verifying that your backups actually work






39. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






40. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






41. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






42. Can create entries in a log for all queries that are received.






43. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






44. A program that is automatically downloaded to your computer without your consent or even your knowledge.






45. A form of filtering that blocks only sites specified as harmful.






46. ____ attacks are responsible for half of all malware delivered by Web advertising.






47. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






48. Securing a restricted area by erecting a barrier is called ____.






49. Set of rules that allow or deny traffic






50. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.