Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Users who access a Web server are usually restricted to the ____ directory.






2. Could become a key element in authentication in the future.






3. A ____ attack is similar to a passive man-in-the-middle attack.






4. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






5. Four interrelated aspects to _________:Access - data - infrastructure - computers






6. ____ involves horizontally separating words - although it is still readable by the human eye.






7. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






8. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






9. Can be used to determine whether new IP addresses are attempting to probe the network.






10. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






11. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






12. A ____ is a network set up with intentional vulnerabilities.






13. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






14. People very knowledgeable about computers who use their knowledge to invade other people's computers






15. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






16. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






17. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






18. A secret combination of letters - numbers - and/or characters that only the user should know.






19. Can create entries in a log for all queries that are received.






20. A security analysis of the transaction within its approved context.






21. Below 40% or above 50%






22. The set of letters - symbols - and characters that make up the password are known as a ____ set.






23. Sending high volumes of UDP requests to a target.






24. An attacker slips through a secure area following a legitimate employee.






25. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






26. How often you perform your backups (cost-benefit analysis of backing up)






27. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






28. A firewall capable of monitoring a data stream from end to end.






29. Allows a single access point to service different types of users.






30. Viruses and worms are said to be self-____.






31. The weakness of passwords centers on ____.






32. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






33. When organizations use software that filters content to prevent the transmission of unauthorized information






34. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






35. Scrambles information into an alternative form that requires a key or password to decrypt the information






36. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






37. ____ can be prewired for electrical power as well as wired network connections.






38. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






39. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






40. Provides a greater degree of security by implementing port-based authentication.






41. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






42. A method for confirming users' identities






43. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






44. How many past backups you keep - what you did on your machine etc.






45. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






46. A user under Role Based Access Control can be assigned only one ____.






47. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






48. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






49. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






50. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.