Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Four interrelated aspects to _________:Access - data - infrastructure - computers






2. When DNS servers exchange information among themselves it is known as a ____.






3. A system of security tools that is used to recognize and identify data that is critical to the organization and ensure that it is protected.






4. A password-protected and encrypted file that holds an individual's identification information - including a public key and a private key. The individual's public key is used to verify the sender's digital signature - and the private key allows the in






5. Sending high volumes of ICMP (usually ping) packets to a target.






6. In the context of SSL encryption - a message issued from the client to the server that contains information about what level of security the client's browser is capable of accepting and what type of encryption the client's browser can decipher (for e






7. A random string of text issued from one computer to another in some forms of authentication. It is used - along with the password (or other credential) - in a response to verify the computer's credentials.






8. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






9. Using a single authentication credential that is shared across multiple networks.






10. How many past backups you keep - what you did on your machine etc.






11. Users who access a Web server are usually restricted to the ____ directory.






12. An attacker slips through a secure area following a legitimate employee.






13. An attack that sends unsolicited messages to Bluetooth-enabled devices.






14. A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.






15. The act of driving while running a laptop configured to detect and capture wireless data transmissions.






16. ____ are a loose-knit network of attackers - identity thieves - and financial fraudsters.






17. Requires that if the fraudulent application of a process could potentially result in a breach of security - then the process should be divided between two or more individuals.






18. Set of rules that allow or deny traffic






19. A ____ does not serve clients - but instead routes incoming requests to the correct server.






20. The process of verifying that your backups actually work






21. The signal from an ID badge is detected as the owner moves near a ____ - which receives the signal.






22. ____ can be prewired for electrical power as well as wired network connections.






23. If a user typically accesses his bank's Web site from his home computer on nights and weekends - then this information can be used to establish a ____ of typical access.






24. In a ____ infection - a virus injects itself into the program's executable code instead of at the end of the file.






25. Sending high volumes of UDP requests to a target.






26. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






27. Malicious or accidental threats by employees. (ex. door to secure building left propped open.)






28. A database - organized as a hierarchy or tree - of the name of each site on the Internet and its corresponding IP number.






29. Can use fingerprints or other unique characteristics of a person's face - hands - or eyes (irises and retinas) to authenticate a user.






30. An AP that is set up by an attacker.






31. A technique for crashing by sending too much data to the buffer in a comuter's memory






32. Pretending to be another person.






33. These attacks may allow an attacker to construct LDAP statements based on user input statements.






34. An attack that targets a computer's physical components and peripherals. (ie. hard disk - motherboard - cabling - etc.)






35. Lock - conduit - card key - video equipment - secured guard






36. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






37. Securing a restricted area by erecting a barrier is called ____.






38. A set of permissions that are attached to an object.






39. Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker. <dumpster diving - or looking through people's trash - etc>






40. ____ is an image spam that is divided into multiple images.






41. A threat that originates from outside the company. (ex. power failure.)






42. Holds the promise of reducing the number of usernames and passwords that users must memorize.






43. A program that is automatically downloaded to your computer without your consent or even your knowledge.






44. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






45. The action that is taken by the subject over the object is called a ____.






46. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






47. Web application attacks are considered ____ attacks.






48. A method for confirming users' identities






49. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






50. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






Can you answer 50 questions in 15 minutes?



Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests