Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A set of permissions that are attached to an object.






2. These attacks may allow an attacker to construct LDAP statements based on user input statements.






3. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






4. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






5. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






6. An attack that forces a user to unintentionally click a link.






7. Related to the perception - thought process - and understanding of the user.






8. An attack that sends unsolicited messages to Bluetooth-enabled devices.






9. Allows a single access point to service different types of users.






10. Computer crimes involving the theft of money






11. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






12. Web application attacks are considered ____ attacks.






13. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






14. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






15. A technique for crashing by sending too much data to the buffer in a comuter's memory






16. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






17. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






18. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






19. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






20. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






21. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






22. A private key and public key






23. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






24. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






25. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






26. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






27. It is able to code and decode data






28. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






29. To create a rainbow table - each ____ begins with an initial password that is encrypted.






30. Password and BioMetric






31. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






32. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






33. A threat that originates from outside the company. (ex. power failure.)






34. A variety of threats such as viruses - worms - and Trojan horses






35. Holds the promise of reducing the number of usernames and passwords that users must memorize.






36. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






37. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






38. Ensures that messages are not corrupt or tampered with






39. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






40. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






41. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






42. A security analysis of the transaction within its approved context.






43. Wants to cause as much damage as possible - without a particular target or goal.






44. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






45. Broadcast storms can be prevented with ____.






46. A ____ encrypts all data that is transmitted between the remote device and the network.






47. ____ attacks are responsible for half of all malware delivered by Web advertising.






48. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






49. It accepts spoken words for input as if they had been typed on the keyboard.






50. ____ can be prewired for electrical power as well as wired network connections.