Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The unique data block that results when an original piece of data (such as text) is encrypted (for example - by using a key.)






2. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac






3. Peering over the shoulder of someone to see the contents on that person's computer or cell phone screen.






4. ____ is an image spam that is divided into multiple images.






5. An attacker motivated by the ideology to attack computer or infrastructure networks.






6. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






7. Viruses and worms are said to be self-____.






8. A ____ tester has an in-depth knowledge of the network and systems being tested - including network diagrams - IP addresses - and even the source code of custom applications.






9. Content filtering - encryption - firewalls






10. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






11. A feature of Windows that is intended to provide users with control of their digital identities while helping them to manage privacy.






12. Can also capture transmissions that contain passwords.






13. Although brute force and dictionary attacks were once the primary tools used by attackers to crack an encrypted password - today attackers usually prefer ____.






14. ____ is an attack in which an attacker attempts to impersonate the user by using his session token.






15. The identification of a user based on a physical characteristic - such as a fingerprint - iris - face - voice - or handwriting






16. The breadth of your back-up (what types of files you will back up-media - documents - OS - etc)






17. Can be accidental or intentional - internal or external. (ex. back-hoe operator performing legitimate construction cuts cables leading into a facility.)






18. Hacker who exposes vulnerabilities for financial gain or malicious purpose.






19. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






20. Holds the promise of reducing the number of usernames and passwords that users must memorize.






21. A firewall capable of monitoring a data stream from end to end.






22. Business ____ theft involves stealing proprietary business information such as research for a new drug or a list of customers that competitors are eager to acquire.






23. Fire - extreme weather - flooding - extreme temperatures - extreme humidity.






24. Computer crimes involving the theft of money






25. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






26. When a device receives a beacon frame from an AP - the device then sends a frame known as a ____ frame to the AP.






27. Can be used to determine whether new IP addresses are attempting to probe the network.






28. The set of letters - symbols - and characters that make up the password are known as a ____ set.






29. Use multiple infrared beams that are aimed across a doorway and positioned so that as a person walks through the doorway some beams are activated.






30. Web application attacks are considered ____ attacks.






31. An attack that forces a user to unintentionally click a link.






32. An independently rotating large cups affixed to the top of a fence prevent the hands of intruders from gripping the top of a fence to climb over it.






33. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






34. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






35. An operating system that has been reengineered so that it is designed to be secure from the ground up is known as a ____.






36. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






37. A program or device that can monitor data traveling over a network. Sniffers can show - all the data being transmitted over a network - including passwords and sensitive information - tends to be a favorite weapon in the hacker's arsenal






38. Securing a restricted area by erecting a barrier is called ____.






39. A method for confirming users' identities






40. The X.500 standard defines a protocol for a client application to access an X.500 directory called ____.






41. A commonly used technique by pornography sites where a user gets "locked" in a web site.






42. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






43. A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.






44. A hacker who exposes security flaws in applications and operating systems so manufacturers can fix them before they become widespread problems.






45. Typically used on home routers that allow multiple users to share one IP address received from an Internet service provider (ISP).






46. Forwards packets across computer networks.






47. The action that is taken by the subject over the object is called a ____.






48. Sifting through a company's garbage to find information to help break into their computers






49. Countless requests for a TCP connection sent to an FTP server - web server - or system attached to the internet.






50. A ____ attack is similar to a passive man-in-the-middle attack.