Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






2. An attacker slips through a secure area following a legitimate employee.






3. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






4. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






5. A ____ is a network set up with intentional vulnerabilities.






6. The time it takes for a key to be pressed and then released.






7. ____ is an image spam that is divided into multiple images.






8. Users who access a Web server are usually restricted to the ____ directory.






9. Set of rules that allow or deny traffic






10. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






11. A commonly used technique by pornography sites where a user gets "locked" in a web site.






12. Software that can guess passwords






13. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






14. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






15. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






16. Provides a greater degree of security by implementing port-based authentication.






17. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






18. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






19. Sending high volumes of UDP requests to a target.






20. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






21. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






22. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






23. A variety of threats such as viruses - worms - and Trojan horses






24. A user accessing a computer system must present credentials or ____ when logging on to the system.






25. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






26. ____ attacks are responsible for half of all malware delivered by Web advertising.






27. Form of phishing that targets wealthy individuals.






28. Forwards packets across computer networks.






29. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






30. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






31. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






32. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






33. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






34. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






35. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






36. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






37. These accounts are user accounts that remain active after an employee has left an organization.






38. A user under Role Based Access Control can be assigned only one ____.






39. Hides inside other software - usually as an attachment or a downloadable file






40. A means of managing and presenting computer resources by function without regard to their physical layout or location.






41. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






42. Related to the perception - thought process - and understanding of the user.






43. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






44. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






45. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






46. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






47. A security analysis of the transaction within its approved context.






48. ____ involves horizontally separating words - although it is still readable by the human eye.






49. Below 40% or above 50%






50. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.