Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Below 70 degrees or above 75 degrees






2. Lock - conduit - card key - video equipment - secured guard






3. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






4. Can be used to determine whether new IP addresses are attempting to probe the network.






5. Keeps a record of the state of a connection between an internal computer and an external device and then makes decisions based on the connection as well as the conditions.






6. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






7. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






8. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






9. The ____ model is the least restrictive.






10. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






11. Securing a restricted area by erecting a barrier is called ____.






12. ____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.






13. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






14. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






15. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






16. Allows a single access point to service different types of users.






17. A secret combination of letters - numbers - and/or characters that only the user should know.






18. A ____ virus infects the Master Boot Record of a hard disk drive.






19. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






20. During RADIUS authentication the AP - serving as the authenticator that will accept or reject the wireless device - creates a data packet from this information called the ____.






21. An attacker redirects an IP address to the MAC address of a computer that is not the intended recipient.






22. A program that is automatically downloaded to your computer without your consent or even your knowledge.






23. To create a rainbow table - each ____ begins with an initial password that is encrypted.






24. Form of phishing that targets wealthy individuals.






25. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






26. How secure the data in your backups is-can use physical security or encryption






27. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






28. These accounts are user accounts that remain active after an employee has left an organization.






29. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






30. When organizations use software that filters content to prevent the transmission of unauthorized information






31. A pay-per-use computing model in which customers pay only for the computing resources they need.






32. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






33. A ____ attack is similar to a passive man-in-the-middle attack.






34. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






35. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






36. A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS attack.






37. The geographical storage of your backups-safest place is a different place from where you keep your actual data






38. A method for confirming users' identities






39. Attacker sets up a rogue DNS server that responds to legitimate requests with IP addresses for malicious or non-existent websites.






40. Could become a key element in authentication in the future.






41. Ensures that messages are not corrupt or tampered with






42. Requires mutual authentication used for WLAN encryption using Cisco client software.






43. A group of piconets in which connections exist between different piconets is called a ____.






44. Wants to cause as much damage as possible - without a particular target or goal.






45. Forwards packets across computer networks.






46. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






47. It accepts spoken words for input as if they had been typed on the keyboard.






48. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






49. The process of giving someone permission to do or have something






50. An attacker motivated by the ideology to attack computer or infrastructure networks.