Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






2. A technology that can help to evenly distribute work across a network.






3. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






4. A security analysis of the transaction within its approved context.






5. Password and BioMetric






6. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






7. How often you perform your backups (cost-benefit analysis of backing up)






8. The process of giving someone permission to do or have something






9. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






10. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






11. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






12. ____ involves horizontally separating words - although it is still readable by the human eye.






13. Sifting through a company's garbage to find information to help break into their computers






14. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






15. Securing a restricted area by erecting a barrier is called ____.






16. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






17. How many past backups you keep - what you did on your machine etc.






18. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






19. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






20. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






21. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






22. Indicates when an account is no longer active.






23. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






24. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






25. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






26. Web application attacks are considered ____ attacks.






27. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






28. An authentication protocol that operates over PPP and that requires the authenticator to take the first step by offering the other computer a challenge. The requestor responds by combining the challenge with its password - encrypting the new string o






29. An attacker motivated by the ideology to attack computer or infrastructure networks.






30. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






31. A user under Role Based Access Control can be assigned only one ____.






32. A private key and public key






33. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






34. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






35. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






36. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






37. A technique for crashing by sending too much data to the buffer in a comuter's memory






38. Forwards packets across computer networks.






39. Users who access a Web server are usually restricted to the ____ directory.






40. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






41. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






42. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






43. Below 70 degrees or above 75 degrees






44. Can create entries in a log for all queries that are received.






45. An attacker slips through a secure area following a legitimate employee.






46. These accounts are user accounts that remain active after an employee has left an organization.






47. Wants to cause as much damage as possible - without a particular target or goal.






48. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






49. People very knowledgeable about computers who use their knowledge to invade other people's computers






50. It is able to code and decode data