Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






2. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






3. Sending high volumes of ICMP (usually ping) packets to a target.






4. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






5. It accepts spoken words for input as if they had been typed on the keyboard.






6. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






7. A means of managing and presenting computer resources by function without regard to their physical layout or location.






8. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






9. An authentication process that involves three steps.






10. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






11. ____ can be prewired for electrical power as well as wired network connections.






12. Hides inside other software - usually as an attachment or a downloadable file






13. An attacker motivated by the ideology to attack computer or infrastructure networks.






14. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






15. A ____ does not serve clients - but instead routes incoming requests to the correct server.






16. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






17. People very knowledgeable about computers who use their knowledge to invade other people's computers






18. An attack that sends unsolicited messages to Bluetooth-enabled devices.






19. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






20. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






21. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






22. An attack that sends unsolicited messages to Bluetooth-enabled devices.






23. A technique that allows private IP addresses to be used on the public Internet.






24. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






25. A ____ means that the application or service assigned to that port is listening for any instructions.






26. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






27. A ____ attack is similar to a passive man-in-the-middle attack.






28. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






29. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






30. A firewall that can block designated types of traffic from entering a protected network.






31. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






32. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






33. Securing a restricted area by erecting a barrier is called ____.






34. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






35. Can also capture transmissions that contain passwords.






36. A technology that can help to evenly distribute work across a network.






37. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






38. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






39. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






40. A form of filtering that blocks only sites specified as harmful.






41. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






42. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






43. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






44. These accounts are user accounts that remain active after an employee has left an organization.






45. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






46. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






47. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






48. Viruses and worms are said to be self-____.






49. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






50. A secret combination of letters - numbers - and/or characters that only the user should know.