Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






2. People very knowledgeable about computers who use their knowledge to invade other people's computers






3. A ____ virus infects the Master Boot Record of a hard disk drive.






4. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






5. How secure the data in your backups is-can use physical security or encryption






6. A firewall capable of monitoring a data stream from end to end.






7. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






8. The set of letters - symbols - and characters that make up the password are known as a ____ set.






9. A group of piconets in which connections exist between different piconets is called a ____.






10. A ____ is designed to separate a nonsecured area from a secured area.






11. A security analysis of the transaction within its approved context.






12. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






13. A commonly used technique by pornography sites where a user gets "locked" in a web site.






14. Viruses and worms are said to be self-____.






15. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






16. Allows a single access point to service different types of users.






17. It accepts spoken words for input as if they had been typed on the keyboard.






18. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






19. Wants to cause as much damage as possible - without a particular target or goal.






20. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






21. Can create entries in a log for all queries that are received.






22. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






23. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






24. Lock - conduit - card key - video equipment - secured guard






25. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






26. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






27. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






28. Below 40% or above 50%






29. A ____ means that the application or service assigned to that port is listening for any instructions.






30. Provides a greater degree of security by implementing port-based authentication.






31. When organizations use software that filters content to prevent the transmission of unauthorized information






32. A pay-per-use computing model in which customers pay only for the computing resources they need.






33. The geographical storage of your backups-safest place is a different place from where you keep your actual data






34. A technique that allows private IP addresses to be used on the public Internet.






35. A ____ does not serve clients - but instead routes incoming requests to the correct server.






36. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






37. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






38. A set of permissions that are attached to an object.






39. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






40. Can also capture transmissions that contain passwords.






41. The most restrictive access control model is ____.






42. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






43. An authentication process that involves three steps.






44. An attacker slips through a secure area following a legitimate employee.






45. It is able to code and decode data






46. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






47. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






48. Pretending to be another person.






49. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






50. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests