Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that is automatically downloaded to your computer without your consent or even your knowledge.






2. Small electronic devices that change user passwords automatically






3. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






4. An attacker slips through a secure area following a legitimate employee.






5. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






6. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






7. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






8. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






9. A ____ attack is similar to a passive man-in-the-middle attack.






10. The action that is taken by the subject over the object is called a ____.






11. The process of giving someone permission to do or have something






12. Hides inside other software - usually as an attachment or a downloadable file






13. Can be used to determine whether new IP addresses are attempting to probe the network.






14. An AP that is set up by an attacker.






15. The time it takes for a key to be pressed and then released.






16. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






17. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






18. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






19. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






20. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






21. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






22. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






23. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






24. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






25. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






26. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






27. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






28. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






29. Requires mutual authentication used for WLAN encryption using Cisco client software.






30. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






31. An attacker motivated by the ideology to attack computer or infrastructure networks.






32. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






33. The set of letters - symbols - and characters that make up the password are known as a ____ set.






34. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






35. Ensures that messages are not corrupt or tampered with






36. A variety of threats such as viruses - worms - and Trojan horses






37. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






38. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






39. How secure the data in your backups is-can use physical security or encryption






40. The ____ model is the least restrictive.






41. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






42. Set of rules that allow or deny traffic






43. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






44. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






45. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






46. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






47. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






48. A method for confirming users' identities






49. A threat that originates from outside the company. (ex. power failure.)






50. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.