Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Password and BioMetric






2. When DNS servers exchange information among themselves it is known as a ____.






3. A commonly used technique by pornography sites where a user gets "locked" in a web site.






4. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






5. Below 40% or above 50%






6. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






7. ____ attacks are responsible for half of all malware delivered by Web advertising.






8. How often you perform your backups (cost-benefit analysis of backing up)






9. A ____ virus infects the Master Boot Record of a hard disk drive.






10. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






11. A firewall that can block designated types of traffic from entering a protected network.






12. Often used for managing user access to one or more systems.






13. A security attack in which an internet user sends commands to another internet user's machine that cause the screen to fill with garbage characters. A flashing attack causes the user to terminate her session.






14. The most restrictive access control model is ____.






15. Small electronic devices that change user passwords automatically






16. Wants to cause as much damage as possible - without a particular target or goal.






17. A firewall capable of monitoring a data stream from end to end.






18. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






19. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






20. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






21. A ____ attack is similar to a passive man-in-the-middle attack.






22. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






23. A user accessing a computer system must present credentials or ____ when logging on to the system.






24. Web application attacks are considered ____ attacks.






25. The process of verifying that your backups actually work






26. The action that is taken by the subject over the object is called a ____.






27. How many past backups you keep - what you did on your machine etc.






28. An attacker motivated by the ideology to attack computer or infrastructure networks.






29. Floods a Web site with so many requests for service that it slows down or crashes the site






30. ____ can be prewired for electrical power as well as wired network connections.






31. Securing a restricted area by erecting a barrier is called ____.






32. A program that is automatically downloaded to your computer without your consent or even your knowledge.






33. A set of permissions that are attached to an object.






34. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






35. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






36. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






37. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






38. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






39. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






40. Fingerprints and patterns






41. Ensures that messages are not corrupt or tampered with






42. How secure the data in your backups is-can use physical security or encryption






43. Form of phishing that targets wealthy individuals.






44. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






45. A ____ does not serve clients - but instead routes incoming requests to the correct server.






46. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






47. A device that is around the same size as a credit card - containing embedded technologies that can store information and small amounts of software to perform some limited processing






48. It accepts spoken words for input as if they had been typed on the keyboard.






49. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






50. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.