Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Set of rules that allow or deny traffic






2. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






3. A method for confirming users' identities






4. Indicates when an account is no longer active.






5. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






6. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






7. To create a rainbow table - each ____ begins with an initial password that is encrypted.






8. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






9. Users who access a Web server are usually restricted to the ____ directory.






10. Provides a greater degree of security by implementing port-based authentication.






11. Can create entries in a log for all queries that are received.






12. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






13. Content filtering - encryption - firewalls






14. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






15. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






16. Scrambles information into an alternative form that requires a key or password to decrypt the information






17. Wants to cause as much damage as possible - without a particular target or goal.






18. Web application attacks are considered ____ attacks.






19. Below 70 degrees or above 75 degrees






20. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






21. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






22. There are almost ____ different Microsoft Windows file extensions that could contain a virus.






23. A ____ does not serve clients - but instead routes incoming requests to the correct server.






24. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






25. A user or a process functioning on behalf of the user that attempts to access an object is known as the ____.






26. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






27. A group of piconets in which connections exist between different piconets is called a ____.






28. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






29. A security analysis of the transaction within its approved context.






30. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






31. A means of managing and presenting computer resources by function without regard to their physical layout or location.






32. The geographical storage of your backups-safest place is a different place from where you keep your actual data






33. A pay-per-use computing model in which customers pay only for the computing resources they need.






34. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






35. A threat that originates from outside the company. (ex. power failure.)






36. ____ can be prewired for electrical power as well as wired network connections.






37. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






38. A ____ encrypts all data that is transmitted between the remote device and the network.






39. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






40. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






41. A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.






42. Pretending to be another person.






43. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






44. Sending high volumes of ICMP (usually ping) packets to a target.






45. Software that can guess passwords






46. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






47. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






48. The weakness of passwords centers on ____.






49. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






50. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.