Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






2. A user accessing a computer system must present credentials or ____ when logging on to the system.






3. A secret combination of letters - numbers - and/or characters that only the user should know.






4. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






5. Broadcast storms can be prevented with ____.






6. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






7. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






8. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






9. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






10. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






11. An authentication process that involves three steps.






12. A security analysis of the transaction within its approved context.






13. A program that is automatically downloaded to your computer without your consent or even your knowledge.






14. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






15. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






16. Often used for managing user access to one or more systems.






17. The process of giving someone permission to do or have something






18. Scrambles information into an alternative form that requires a key or password to decrypt the information






19. A commonly used technique by pornography sites where a user gets "locked" in a web site.






20. A ____ means that the application or service assigned to that port is listening for any instructions.






21. A private key and public key






22. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






23. A technique that allows private IP addresses to be used on the public Internet.






24. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






25. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






26. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






27. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






28. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






29. Floods a Web site with so many requests for service that it slows down or crashes the site






30. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






31. Form of phishing that targets wealthy individuals.






32. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






33. The protection of information from accidental or intentional misuse by persons inside or outside an organization






34. A framework for transporting authentication protocols instead of the authentication protocol itself.






35. It is able to code and decode data






36. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






37. An authentication system developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of networked users.






38. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






39. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






40. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






41. These attacks may allow an attacker to construct LDAP statements based on user input statements.






42. How often you perform your backups (cost-benefit analysis of backing up)






43. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






44. A form of filtering that blocks only sites specified as harmful.






45. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






46. Holds the promise of reducing the number of usernames and passwords that users must memorize.






47. A ____ is a network set up with intentional vulnerabilities.






48. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






49. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






50. A ____ is designed to separate a nonsecured area from a secured area.