Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






2. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






3. The weakness of passwords centers on ____.






4. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






5. Pretending to be another person.






6. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






7. A group of piconets in which connections exist between different piconets is called a ____.






8. An attempt to discover an encryption key or password by trying numerous possible character combinations. usually - a brute force attack is performed rapidly by a program designed for that purpose.






9. Indicates when an account is no longer active.






10. An attacker slips through a secure area following a legitimate employee.






11. These attacks may allow an attacker to construct LDAP statements based on user input statements.






12. A framework for transporting authentication protocols instead of the authentication protocol itself.






13. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






14. Web application attacks are considered ____ attacks.






15. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






16. A pay-per-use computing model in which customers pay only for the computing resources they need.






17. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






18. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






19. Fingerprints and patterns






20. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






21. A secret combination of letters - numbers - and/or characters that only the user should know.






22. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






23. A ____ does not serve clients - but instead routes incoming requests to the correct server.






24. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






25. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






26. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






27. An attack that sends unsolicited messages to Bluetooth-enabled devices.






28. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






29. ____ involves horizontally separating words - although it is still readable by the human eye.






30. When DNS servers exchange information among themselves it is known as a ____.






31. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






32. A private key and public key






33. A ____ is designed to separate a nonsecured area from a secured area.






34. Below 40% or above 50%






35. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






36. An attack that forces a user to unintentionally click a link.






37. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






38. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






39. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






40. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






41. Due to the limitations of online guessing - most password attacks today use ____.






42. Form of phishing that targets wealthy individuals.






43. To create a rainbow table - each ____ begins with an initial password that is encrypted.






44. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






45. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






46. A firewall capable of monitoring a data stream from end to end.






47. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






48. Viruses and worms are said to be self-____.






49. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






50. When organizations use software that filters content to prevent the transmission of unauthorized information