Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A program that is automatically downloaded to your computer without your consent or even your knowledge.






2. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






3. Web application attacks are considered ____ attacks.






4. Often used for managing user access to one or more systems.






5. A security analysis of the transaction within its approved context.






6. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






7. Ensures that messages are not corrupt or tampered with






8. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






9. Allows a single access point to service different types of users.






10. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






11. The process of giving someone permission to do or have something






12. Floods a Web site with so many requests for service that it slows down or crashes the site






13. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






14. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






15. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






16. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






17. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






18. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






19. Software that comes hidden in free downloadable software and tracks online movements - mines the information stored on a computer - or uses a computer's CPU and storage for some task the user knows nothing about - can cause extremely slow performance






20. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






21. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






22. Sifting through a company's garbage to find information to help break into their computers






23. A form of filtering that blocks only sites specified as harmful.






24. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






25. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






26. The weakness of passwords centers on ____.






27. Form of phishing that targets wealthy individuals.






28. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






29. People very knowledgeable about computers who use their knowledge to invade other people's computers






30. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






31. Pretending to be another person.






32. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






33. Related to the perception - thought process - and understanding of the user.






34. A ____ encrypts all data that is transmitted between the remote device and the network.






35. A technique for crashing by sending too much data to the buffer in a comuter's memory






36. A method for confirming users' identities






37. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






38. ____ involves horizontally separating words - although it is still readable by the human eye.






39. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






40. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






41. Indicates when an account is no longer active.






42. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






43. An attacker motivated by the ideology to attack computer or infrastructure networks.






44. An attacker slips through a secure area following a legitimate employee.






45. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






46. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






47. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






48. A commonly used technique by pornography sites where a user gets "locked" in a web site.






49. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






50. Sending high volumes of UDP requests to a target.