Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






2. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






3. Forwards packets across computer networks.






4. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






5. Could become a key element in authentication in the future.






6. An attack that forces a user to unintentionally click a link.






7. It accepts spoken words for input as if they had been typed on the keyboard.






8. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






9. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






10. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






11. Mass mailings sent as Instant Messages to users. Often these can feature links to explicit porn sites.






12. Hurricanes - tornadoes - flooding and earthquakes are all examples of this.






13. A form of filtering that blocks only sites specified as harmful.






14. Provides a greater degree of security by implementing port-based authentication.






15. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






16. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






17. Using a single authentication credential that is shared across multiple networks.






18. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






19. If a password is communicated across a network to log on to a remote system - it is vulnerable to ______.






20. Type of software attack where an attacker captures network traffic and stores it for retransmission at a later time to gain unauthorized access to a network.






21. The protection of information from accidental or intentional misuse by persons inside or outside an organization






22. How often you perform your backups (cost-benefit analysis of backing up)






23. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






24. The Chinese government uses _____ to prevent Internet content that it considers unfavorable from reaching its citizenry.






25. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






26. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






27. When organizations use software that filters content to prevent the transmission of unauthorized information






28. An attack where the goal is to extract personal - financial or confidential information from the victim by using services such as the telephone or VOIP.






29. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






30. Below 40% or above 50%






31. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






32. A pay-per-use computing model in which customers pay only for the computing resources they need.






33. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






34. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






35. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






36. Can create entries in a log for all queries that are received.






37. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






38. A firewall that can block designated types of traffic from entering a protected network.






39. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






40. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






41. Wants to cause as much damage as possible - without a particular target or goal.






42. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






43. Holds the promise of reducing the number of usernames and passwords that users must memorize.






44. A means of managing and presenting computer resources by function without regard to their physical layout or location.






45. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






46. The action that is taken by the subject over the object is called a ____.






47. A user under Role Based Access Control can be assigned only one ____.






48. Related to the perception - thought process - and understanding of the user.






49. A security analysis of the transaction within its approved context.






50. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)