Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






2. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






3. A technique for crashing by sending too much data to the buffer in a comuter's memory






4. A form of filtering that blocks only sites specified as harmful.






5. Using a single authentication credential that is shared across multiple networks.






6. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






7. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






8. A technique that allows private IP addresses to be used on the public Internet.






9. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






10. These accounts are user accounts that remain active after an employee has left an organization.






11. Form of phishing that targets wealthy individuals.






12. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






13. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






14. Related to the perception - thought process - and understanding of the user.






15. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






16. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






17. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






18. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






19. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






20. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






21. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






22. An authentication process that involves three steps.






23. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






24. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






25. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






26. A user under Role Based Access Control can be assigned only one ____.






27. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






28. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






29. Below 70 degrees or above 75 degrees






30. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






31. How secure the data in your backups is-can use physical security or encryption






32. It accepts spoken words for input as if they had been typed on the keyboard.






33. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






34. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






35. Pretending to be another person.






36. A framework for transporting authentication protocols instead of the authentication protocol itself.






37. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






38. People very knowledgeable about computers who use their knowledge to invade other people's computers






39. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






40. Allows a single access point to service different types of users.






41. Scrambles information into an alternative form that requires a key or password to decrypt the information






42. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






43. Can create entries in a log for all queries that are received.






44. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






45. It is able to code and decode data






46. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






47. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






48. Ensures that messages are not corrupt or tampered with






49. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






50. Hides inside other software - usually as an attachment or a downloadable file