Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






2. Small electronic devices that change user passwords automatically






3. An AP that is set up by an attacker.






4. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






5. A secret combination of letters - numbers - and/or characters that only the user should know.






6. A framework for transporting authentication protocols instead of the authentication protocol itself.






7. Related to the perception - thought process - and understanding of the user.






8. A ____ is a network set up with intentional vulnerabilities.






9. ____ attacks are responsible for half of all malware delivered by Web advertising.






10. Allows a single access point to service different types of users.






11. Floods a Web site with so many requests for service that it slows down or crashes the site






12. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






13. Pretending to be another person.






14. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






15. A ____ virus infects the Master Boot Record of a hard disk drive.






16. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






17. Below 70 degrees or above 75 degrees






18. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






19. A commonly used technique by pornography sites where a user gets "locked" in a web site.






20. The weakness of passwords centers on ____.






21. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






22. How many past backups you keep - what you did on your machine etc.






23. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






24. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






25. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






26. Ensures that messages are not corrupt or tampered with






27. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






28. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






29. Wants to cause as much damage as possible - without a particular target or goal.






30. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






31. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






32. To create a rainbow table - each ____ begins with an initial password that is encrypted.






33. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






34. The process of verifying that your backups actually work






35. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






36. Sending high volumes of UDP requests to a target.






37. The protection of information from accidental or intentional misuse by persons inside or outside an organization






38. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






39. A pay-per-use computing model in which customers pay only for the computing resources they need.






40. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






41. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






42. Sifting through a company's garbage to find information to help break into their computers






43. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






44. A ____ does not serve clients - but instead routes incoming requests to the correct server.






45. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






46. A variety of threats such as viruses - worms - and Trojan horses






47. Fingerprints and patterns






48. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






49. ____ is an image spam that is divided into multiple images.






50. An attack that sends unsolicited messages to Bluetooth-enabled devices.