Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wants to cause as much damage as possible - without a particular target or goal.






2. A framework for transporting authentication protocols instead of the authentication protocol itself.






3. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






4. A commonly used technique by pornography sites where a user gets "locked" in a web site.






5. A secret combination of letters - numbers - and/or characters that only the user should know.






6. It is able to code and decode data






7. Holds the promise of reducing the number of usernames and passwords that users must memorize.






8. ____ is an image spam that is divided into multiple images.






9. A ____ is designed to separate a nonsecured area from a secured area.






10. Fingerprints and patterns






11. The most restrictive access control model is ____.






12. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






13. A means of managing and presenting computer resources by function without regard to their physical layout or location.






14. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






15. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






16. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






17. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






18. A firewall that can block designated types of traffic from entering a protected network.






19. Four interrelated aspects to _________:Access - data - infrastructure - computers






20. The ____ model is the least restrictive.






21. An authentication service commonly used on UNIX devices that communicates by forwarding user authentication information to a centralized server.






22. A set of permissions that are attached to an object.






23. An attack that sends unsolicited messages to Bluetooth-enabled devices.






24. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






25. Scrambles information into an alternative form that requires a key or password to decrypt the information






26. Broadcast storms can be prevented with ____.






27. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






28. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






29. Below 40% or above 50%






30. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






31. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






32. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






33. It accepts spoken words for input as if they had been typed on the keyboard.






34. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






35. Requires mutual authentication used for WLAN encryption using Cisco client software.






36. An attack that sends unsolicited messages to Bluetooth-enabled devices.






37. Form of phishing that targets wealthy individuals.






38. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






39. Motivated by a desire to cause social change - trying to get media attention by disrupting services - or promoting a message by changing information on public websites.






40. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






41. An AP that is set up by an attacker.






42. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






43. Web application attacks are considered ____ attacks.






44. ____ attacks are responsible for half of all malware delivered by Web advertising.






45. A threat that originates from outside the company. (ex. power failure.)






46. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






47. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






48. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






49. The process of giving someone permission to do or have something






50. A ____ means that the application or service assigned to that port is listening for any instructions.