Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






2. When organizations use software that filters content to prevent the transmission of unauthorized information






3. A commonly used technique by pornography sites where a user gets "locked" in a web site.






4. Fingerprints and patterns






5. Sending high volumes of ICMP (usually ping) packets to a target.






6. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






7. Due to the limitations of online guessing - most password attacks today use ____.






8. Sending high volumes of UDP requests to a target.






9. A technique for crashing by sending too much data to the buffer in a comuter's memory






10. Provides a greater degree of security by implementing port-based authentication.






11. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






12. Lock - conduit - card key - video equipment - secured guard






13. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






14. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






15. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






16. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






17. ____ involves horizontally separating words - although it is still readable by the human eye.






18. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






19. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






20. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






21. Can create entries in a log for all queries that are received.






22. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






23. Password and BioMetric






24. People very knowledgeable about computers who use their knowledge to invade other people's computers






25. Holds the promise of reducing the number of usernames and passwords that users must memorize.






26. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






27. Allows a single access point to service different types of users.






28. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






29. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






30. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






31. A ____ virus infects the Master Boot Record of a hard disk drive.






32. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






33. A secret combination of letters - numbers - and/or characters that only the user should know.






34. Users who access a Web server are usually restricted to the ____ directory.






35. The geographical storage of your backups-safest place is a different place from where you keep your actual data






36. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






37. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






38. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






39. Four interrelated aspects to _________:Access - data - infrastructure - computers






40. To create a rainbow table - each ____ begins with an initial password that is encrypted.






41. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






42. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






43. Sifting through a company's garbage to find information to help break into their computers






44. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






45. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






46. ____ is an image spam that is divided into multiple images.






47. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






48. Broadcast storms can be prevented with ____.






49. An attack that forces a user to unintentionally click a link.






50. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.