Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident <tell people passwords - etc>






2. A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software - such as Trojans - viruses - or worms.






3. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






4. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






5. In a ____ attack - attackers can attackers use hundreds or thousands of computers in an attack against a single computer or network.






6. A user under Role Based Access Control can be assigned only one ____.






7. Magnetic tape drives - hard drives - optical media (CD or DVD) - solid-state media (flash drives or SD)






8. A security analysis of the transaction within its approved context.






9. Using video cameras to transmit a signal to a specific and limited set of receivers is called ____.






10. Software that searches a server - switch - router - or other device for open ports - which can be vulnerable to attack.






11. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






12. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






13. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






14. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






15. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






16. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






17. A set of permissions that are attached to an object.






18. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






19. A technique for crashing by sending too much data to the buffer in a comuter's memory






20. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






21. A ____ is a network set up with intentional vulnerabilities.






22. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






23. A pay-per-use computing model in which customers pay only for the computing resources they need.






24. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






25. The weakness of passwords centers on ____.






26. Can be used to determine whether new IP addresses are attempting to probe the network.






27. The time it takes for a key to be pressed and then released.






28. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






29. Password and BioMetric






30. The geographical storage of your backups-safest place is a different place from where you keep your actual data






31. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






32. People very knowledgeable about computers who use their knowledge to invade other people's computers






33. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






34. A private key and public key






35. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






36. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






37. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






38. Broadcast storms can be prevented with ____.






39. An attack that sends unsolicited messages to Bluetooth-enabled devices.






40. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






41. Ensures that messages are not corrupt or tampered with






42. Scrambles information into an alternative form that requires a key or password to decrypt the information






43. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






44. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






45. Email attack that targets only specific users and has familiar information in it - making it more tempting to click the links in the message.






46. ____ is an image spam that is divided into multiple images.






47. Floods a Web site with so many requests for service that it slows down or crashes the site






48. A ____ can block malicious content in "real time" as it appears without first knowing the URL of a dangerous site.






49. Set of rules that allow or deny traffic






50. Using a single authentication credential that is shared across multiple networks.