Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






2. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






3. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






4. Wants to cause as much damage as possible - without a particular target or goal.






5. An AP that is set up by an attacker.






6. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






7. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






8. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






9. The process of giving someone permission to do or have something






10. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






11. These attacks may allow an attacker to construct LDAP statements based on user input statements.






12. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






13. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






14. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






15. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






16. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






17. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






18. To create a rainbow table - each ____ begins with an initial password that is encrypted.






19. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






20. A variety of threats such as viruses - worms - and Trojan horses






21. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






22. A form of filtering that blocks only sites specified as harmful.






23. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






24. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






25. Sending high volumes of UDP requests to a target.






26. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






27. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






28. Pretending to be another person.






29. An attacker slips through a secure area following a legitimate employee.






30. The weakness of passwords centers on ____.






31. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






32. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






33. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






34. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






35. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






36. Set of rules that allow or deny traffic






37. A commonly used technique by pornography sites where a user gets "locked" in a web site.






38. ____ attacks are responsible for half of all malware delivered by Web advertising.






39. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






40. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






41. The most restrictive access control model is ____.






42. Indicates when an account is no longer active.






43. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






44. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






45. How often you perform your backups (cost-benefit analysis of backing up)






46. An attack that sends unsolicited messages to Bluetooth-enabled devices.






47. A pay-per-use computing model in which customers pay only for the computing resources they need.






48. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






49. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






50. Password and BioMetric