Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Indicates when an account is no longer active.






2. Can be used to determine whether new IP addresses are attempting to probe the network.






3. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






4. A ____ attack is similar to a passive man-in-the-middle attack.






5. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






6. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






7. Hardware and/or software that guards a private network by analyzing the information leaving and entering the network






8. It accepts spoken words for input as if they had been typed on the keyboard.






9. Software written with malicious intent to cause annoyance or damage - need to attach to something (such as an executable file)






10. Web application attacks are considered ____ attacks.






11. Form of phishing that targets wealthy individuals.






12. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






13. Often used for managing user access to one or more systems.






14. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






15. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






16. A secret combination of letters - numbers - and/or characters that only the user should know.






17. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






18. A ____ encrypts all data that is transmitted between the remote device and the network.






19. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






20. An attack that sends unsolicited messages to Bluetooth-enabled devices.






21. The protection of information from accidental or intentional misuse by persons inside or outside an organization






22. Using a single authentication credential that is shared across multiple networks.






23. A group of piconets in which connections exist between different piconets is called a ____.






24. The weakness of passwords centers on ____.






25. A threat that originates from outside the company. (ex. power failure.)






26. These accounts are user accounts that remain active after an employee has left an organization.






27. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






28. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






29. A ____ is designed to separate a nonsecured area from a secured area.






30. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






31. A firewall that can block designated types of traffic from entering a protected network.






32. How many past backups you keep - what you did on your machine etc.






33. A means of managing and presenting computer resources by function without regard to their physical layout or location.






34. Computer crimes involving the theft of money






35. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






36. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






37. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






38. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






39. ____ can be prewired for electrical power as well as wired network connections.






40. The geographical storage of your backups-safest place is a different place from where you keep your actual data






41. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






42. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






43. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






44. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






45. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






46. Requires mutual authentication used for WLAN encryption using Cisco client software.






47. An attack that forces a user to unintentionally click a link.






48. The process of verifying that your backups actually work






49. These attacks may allow an attacker to construct LDAP statements based on user input statements.






50. A technique for crashing by sending too much data to the buffer in a comuter's memory