Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The time it takes for a key to be pressed and then released.






2. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






3. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






4. A means of managing and presenting computer resources by function without regard to their physical layout or location.






5. An attack that sends unsolicited messages to Bluetooth-enabled devices.






6. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






7. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






8. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






9. These accounts are user accounts that remain active after an employee has left an organization.






10. The process of giving someone permission to do or have something






11. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






12. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






13. Form of phishing that targets wealthy individuals.






14. A pay-per-use computing model in which customers pay only for the computing resources they need.






15. A user accessing a computer system must present credentials or ____ when logging on to the system.






16. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






17. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






18. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






19. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






20. A ____ is designed to separate a nonsecured area from a secured area.






21. A user under Role Based Access Control can be assigned only one ____.






22. Broadcast storms can be prevented with ____.






23. Password and BioMetric






24. Viruses and worms are said to be self-____.






25. An attack that forces a user to unintentionally click a link.






26. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






27. A set of permissions that are attached to an object.






28. A firewall that can block designated types of traffic from entering a protected network.






29. Often used for managing user access to one or more systems.






30. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






31. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






32. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






33. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






34. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






35. A method for confirming users' identities






36. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






37. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






38. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






39. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






40. Allows a single access point to service different types of users.






41. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






42. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






43. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






44. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






45. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






46. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






47. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






48. Forwards packets across computer networks.






49. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






50. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.