Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When DNS servers exchange information among themselves it is known as a ____.






2. The action that is taken by the subject over the object is called a ____.






3. Scrambles information into an alternative form that requires a key or password to decrypt the information






4. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






5. Viruses and worms are said to be self-____.






6. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






7. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






8. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






9. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






10. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






11. Holds the promise of reducing the number of usernames and passwords that users must memorize.






12. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






13. A technique that allows private IP addresses to be used on the public Internet.






14. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






15. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






16. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






17. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






18. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






19. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






20. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






21. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






22. Hides inside other software - usually as an attachment or a downloadable file






23. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






24. A pay-per-use computing model in which customers pay only for the computing resources they need.






25. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






26. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






27. An attacker motivated by the ideology to attack computer or infrastructure networks.






28. An attacker slips through a secure area following a legitimate employee.






29. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






30. A ____ is designed to separate a nonsecured area from a secured area.






31. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






32. The geographical storage of your backups-safest place is a different place from where you keep your actual data






33. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






34. Web application attacks are considered ____ attacks.






35. How secure the data in your backups is-can use physical security or encryption






36. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






37. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






38. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






39. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






40. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






41. The protection of information from accidental or intentional misuse by persons inside or outside an organization






42. Computer crimes involving the theft of money






43. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






44. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






45. A threat that originates from outside the company. (ex. power failure.)






46. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






47. Often used for managing user access to one or more systems.






48. A ____ is a network set up with intentional vulnerabilities.






49. Pretending to be another person.






50. A technology that can help to evenly distribute work across a network.