Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






2. Scrambles information into an alternative form that requires a key or password to decrypt the information






3. Password and BioMetric






4. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






5. An attacker slips through a secure area following a legitimate employee.






6. It accepts spoken words for input as if they had been typed on the keyboard.






7. A method for confirming users' identities






8. The action that is taken by the subject over the object is called a ____.






9. Due to the limitations of online guessing - most password attacks today use ____.






10. Ensures that messages are not corrupt or tampered with






11. An attack that sends unsolicited messages to Bluetooth-enabled devices.






12. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






13. When organizations use software that filters content to prevent the transmission of unauthorized information






14. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






15. Four interrelated aspects to _________:Access - data - infrastructure - computers






16. A form of filtering that blocks only sites specified as harmful.






17. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






18. It is able to code and decode data






19. Could become a key element in authentication in the future.






20. Pretending to be another person.






21. Small electronic devices that change user passwords automatically






22. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






23. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






24. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






25. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






26. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






27. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






28. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






29. Securing a restricted area by erecting a barrier is called ____.






30. An attack that sends unsolicited messages to Bluetooth-enabled devices.






31. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






32. A pay-per-use computing model in which customers pay only for the computing resources they need.






33. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






34. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






35. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






36. Using a single authentication credential that is shared across multiple networks.






37. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






38. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






39. Has limited technical knowledge and is motivated by a desire to gain and display technical skills.






40. ____ can be prewired for electrical power as well as wired network connections.






41. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






42. A user under Role Based Access Control can be assigned only one ____.






43. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






44. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






45. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






46. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






47. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






48. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






49. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






50. Content filtering - encryption - firewalls