Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






2. A firewall capable of monitoring a data stream from end to end.






3. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






4. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






5. Viruses and worms are said to be self-____.






6. An attacker slips through a secure area following a legitimate employee.






7. ____ can be prewired for electrical power as well as wired network connections.






8. A threat that originates from outside the company. (ex. power failure.)






9. A program that is automatically downloaded to your computer without your consent or even your knowledge.






10. Can create entries in a log for all queries that are received.






11. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






12. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






13. Indicates when an account is no longer active.






14. Broadcast storms can be prevented with ____.






15. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






16. Can be used to determine whether new IP addresses are attempting to probe the network.






17. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






18. A ____ does not serve clients - but instead routes incoming requests to the correct server.






19. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






20. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






21. The set of letters - symbols - and characters that make up the password are known as a ____ set.






22. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






23. Wants to cause as much damage as possible - without a particular target or goal.






24. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






25. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






26. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






27. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






28. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






29. Floods a Web site with so many requests for service that it slows down or crashes the site






30. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






31. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






32. Hides inside other software - usually as an attachment or a downloadable file






33. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






34. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






35. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






36. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






37. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






38. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






39. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






40. A user accessing a computer system must present credentials or ____ when logging on to the system.






41. People very knowledgeable about computers who use their knowledge to invade other people's computers






42. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






43. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






44. Pretending to be another person.






45. Requires mutual authentication used for WLAN encryption using Cisco client software.






46. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






47. Below 40% or above 50%






48. How often you perform your backups (cost-benefit analysis of backing up)






49. Users who access a Web server are usually restricted to the ____ directory.






50. The ____ model is the least restrictive.