Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Computer crimes involving the theft of money






2. A ____ means that the application or service assigned to that port is listening for any instructions.






3. A set of permissions that are attached to an object.






4. An attack that forces a user to unintentionally click a link.






5. Web application attacks are considered ____ attacks.






6. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






7. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






8. A variety of threats such as viruses - worms - and Trojan horses






9. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






10. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






11. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






12. Related to the perception - thought process - and understanding of the user.






13. Can also capture transmissions that contain passwords.






14. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






15. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






16. Due to the limitations of online guessing - most password attacks today use ____.






17. People very knowledgeable about computers who use their knowledge to invade other people's computers






18. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






19. Wants to cause as much damage as possible - without a particular target or goal.






20. The ____ model is the least restrictive.






21. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






22. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






23. The most restrictive access control model is ____.






24. Often used for managing user access to one or more systems.






25. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






26. Can create entries in a log for all queries that are received.






27. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






28. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






29. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






30. ____ involves horizontally separating words - although it is still readable by the human eye.






31. Requires mutual authentication used for WLAN encryption using Cisco client software.






32. A technique that allows private IP addresses to be used on the public Internet.






33. Indicates when an account is no longer active.






34. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






35. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






36. A method for confirming users' identities






37. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






38. An attacker slips through a secure area following a legitimate employee.






39. Broadcast storms can be prevented with ____.






40. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






41. A ____ attack is similar to a passive man-in-the-middle attack.






42. It accepts spoken words for input as if they had been typed on the keyboard.






43. Below 40% or above 50%






44. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






45. The process of verifying that your backups actually work






46. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






47. A ____ is a network set up with intentional vulnerabilities.






48. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






49. How secure the data in your backups is-can use physical security or encryption






50. Hacker who exposes vulnerabilities for financial gain or malicious purpose.