Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






2. A commonly used technique by pornography sites where a user gets "locked" in a web site.






3. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






4. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






5. The ____ model is the least restrictive.






6. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






7. Below 70 degrees or above 75 degrees






8. Scrambles information into an alternative form that requires a key or password to decrypt the information






9. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






10. Provides a greater degree of security by implementing port-based authentication.






11. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






12. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






13. ____ attacks are responsible for half of all malware delivered by Web advertising.






14. A user under Role Based Access Control can be assigned only one ____.






15. Fingerprints and patterns






16. A private key and public key






17. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






18. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






19. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






20. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






21. Set of rules that allow or deny traffic






22. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






23. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






24. When organizations use software that filters content to prevent the transmission of unauthorized information






25. Sifting through a company's garbage to find information to help break into their computers






26. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






27. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






28. Viruses and worms are said to be self-____.






29. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






30. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






31. ____ can be prewired for electrical power as well as wired network connections.






32. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






33. Indicates when an account is no longer active.






34. Below 40% or above 50%






35. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






36. Securing a restricted area by erecting a barrier is called ____.






37. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






38. The most restrictive access control model is ____.






39. Due to the limitations of online guessing - most password attacks today use ____.






40. The weakness of passwords centers on ____.






41. Could become a key element in authentication in the future.






42. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






43. These accounts are user accounts that remain active after an employee has left an organization.






44. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






45. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






46. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






47. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






48. An attack that sends unsolicited messages to Bluetooth-enabled devices.






49. Four interrelated aspects to _________:Access - data - infrastructure - computers






50. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.