Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






2. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






3. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






4. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






5. Below 40% or above 50%






6. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






7. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






8. These accounts are user accounts that remain active after an employee has left an organization.






9. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






10. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






11. Software that can guess passwords






12. An attack that forces a user to unintentionally click a link.






13. Forwards packets across computer networks.






14. A technique for crashing by sending too much data to the buffer in a comuter's memory






15. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






16. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






17. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






18. How secure the data in your backups is-can use physical security or encryption






19. An attack that sends unsolicited messages to Bluetooth-enabled devices.






20. A ____ is a network set up with intentional vulnerabilities.






21. An attack that sends unsolicited messages to Bluetooth-enabled devices.






22. A ____ encrypts all data that is transmitted between the remote device and the network.






23. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






24. A ____ does not serve clients - but instead routes incoming requests to the correct server.






25. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






26. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






27. Indicates when an account is no longer active.






28. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






29. A private key and public key






30. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






31. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






32. An AP that is set up by an attacker.






33. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






34. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






35. Four interrelated aspects to _________:Access - data - infrastructure - computers






36. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






37. A ____ is designed to separate a nonsecured area from a secured area.






38. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






39. Wants to cause as much damage as possible - without a particular target or goal.






40. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






41. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






42. These attacks may allow an attacker to construct LDAP statements based on user input statements.






43. When DNS servers exchange information among themselves it is known as a ____.






44. A set of permissions that are attached to an object.






45. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






46. A user accessing a computer system must present credentials or ____ when logging on to the system.






47. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






48. Floods a Web site with so many requests for service that it slows down or crashes the site






49. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






50. ____ can be prewired for electrical power as well as wired network connections.