Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technique that allows private IP addresses to be used on the public Internet.






2. Computer crimes involving the theft of money






3. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






4. Suitable for what are called "high-volume service control applications" such as dial-in access to a corporate network.






5. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






6. The process of verifying that your backups actually work






7. A ____ attack is similar to a passive man-in-the-middle attack.






8. Form of phishing that targets wealthy individuals.






9. An attacker slips through a secure area following a legitimate employee.






10. Below 40% or above 50%






11. The weakness of passwords centers on ____.






12. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






13. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






14. Small electronic devices that change user passwords automatically






15. An attack that intercepts legitimate communication between two victims and captures - analyzes and possibly alters the data packets before sending a fake reply.






16. Considered a more "real world" access control than the other models because the access is based on a user's job function within an organization.






17. The most restrictive access control model is ____.






18. Sending or posting harmful or cruel text or images using the internet or other digital communication devices.






19. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






20. An attack that forces a user to unintentionally click a link.






21. Floods a Web site with so many requests for service that it slows down or crashes the site






22. A private key and public key






23. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






24. Web application attacks are considered ____ attacks.






25. Permits users to share resources stored on one site with a second site without forwarding their authentication credentials to the other site.






26. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






27. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






28. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






29. It is able to code and decode data






30. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






31. A form of filtering that blocks only sites specified as harmful.






32. Password and BioMetric






33. Due to the limitations of online guessing - most password attacks today use ____.






34. Provides a greater degree of security by implementing port-based authentication.






35. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






36. A firewall capable of monitoring a data stream from end to end.






37. A ____ does not serve clients - but instead routes incoming requests to the correct server.






38. Content filtering - encryption - firewalls






39. Broadcast storms can be prevented with ____.






40. Windows Live ID was originally designed as a ____ system that would be used by a wide variety of Web servers.






41. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






42. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






43. Forwards packets across computer networks.






44. Viruses and worms are said to be self-____.






45. A variety of threats such as viruses - worms - and Trojan horses






46. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






47. A threat to networked hosts in which the host is flooded with broadcast ping messages. A _____ _____ is a type of denial-of-service attack.






48. A standard that provides a predefined framework for hardware and software developers who need to implement access control in their devices or applications.






49. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






50. Pretending to be another person.