Test your basic knowledge |

Information Security

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These access points are serious threats to network security because they allow attackers to intercept the RF signal and bypass network security to attack the network or capture sensitive data.






2. An authentication process that involves three steps.






3. These accounts are user accounts that remain active after an employee has left an organization.






4. Generally represent disgruntled employees and alike who are seeking to perform vengeful acts against their current or former employer.






5. Pretending to be another person.






6. An attack that sends unsolicited messages to Bluetooth-enabled devices.






7. ____ involves stealing another person's personal information - such as a Social Security number - and then using the information to impersonate the victim - generally for financial gain.






8. Tools used to configure ________: WEP - WPA - MAC address filtering - SSID broadcasting - wireless antennae






9. The process of giving someone permission to do or have something






10. When organizations use software that filters content to prevent the transmission of unauthorized information






11. Viruses and worms are said to be self-____.






12. A person who uses his knowledge of operating systems and utilities to intentionally damage or destroy data or systems.






13. A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic - yet they are actually imitations of real data files.






14. A form of filtering that blocks only sites specified as harmful.






15. Below 70 degrees or above 75 degrees






16. To create a rainbow table - each ____ begins with an initial password that is encrypted.






17. Below 40% or above 50%






18. Sending extremely critcal - derogatory - and oftern vulgar email messages or newsgroup postings to other user on the internet or online services






19. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






20. Content filtering - encryption - firewalls






21. A firewall capable only of examining packets individually. Stateless firewalls perform more quickly than stateful firewalls - but are not as sophisticated.






22. The most popular attack toolkit - which has almost half of the attacker toolkit market is ____.






23. ____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.






24. The perimeter of a protected - internal network where users - both authorized and unauthorized - from external networks can attempt to access it. Firewalls and IDS/IPS systems are typically placed in the DMZ.






25. ____ IP addresses are IP addresses that are not assigned to any specific user or organization.






26. Hides inside other software - usually as an attachment or a downloadable file






27. The most common protocol suite used today for local area networks (LANs) as well as the Internet is ____.






28. Attack computer systems by transmitting a virus hoax - with a real virus attached. By masking the attack in a seemingly legitimate message - unsuspecting users more readily distribute the message and send the attack on to their co-workers and friends






29. A user under Role Based Access Control can be assigned only one ____.






30. Securing a restricted area by erecting a barrier is called ____.






31. A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.






32. Users who access a Web server are usually restricted to the ____ directory.






33. Forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender. This is not a virus but rather a way by which virus authors conceal their identities as they send out viruses.






34. ____ are combination locks that use buttons which must be pushed in the proper sequence to open the door.






35. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






36. This attack is where every possible combination of letters - numbers - and characters is used to create encrypted passwords.






37. An attack that uses multiple computers on disparate networks to launch an attack from multiple hosts simultaneously.






38. A commonly used technique by pornography sites where a user gets "locked" in a web site.






39. A type of virus that spreads itself - not only from file to file - but also from computer to computer - do not need to attach to anything to spread and can tunnel themselves into computers.






40. Wants to cause as much damage as possible - without a particular target or goal.






41. A list of statements used by a router to permit or deny the forwarding of traffic on a network based on one or more criteria.






42. The ____ attack will slightly alter dictionary words by adding numbers to the end of the password - spelling words backward - slightly misspelling words - or including special characters such as @ - $ - ! - or %.






43. Terms that can refer to the online enticement of children; rude or threatening messages; slanderous information; or repeated - unwanted messages






44. A technique for crashing by sending too much data to the buffer in a comuter's memory






45. Form of phishing that targets wealthy individuals.






46. Sending high volumes of ICMP (usually ping) packets to a target.






47. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection - often between cell phones and laptop computers.






48. Due to the limitations of online guessing - most password attacks today use ____.






49. Software attack using special monitoring software to gain access to private communications on the network wire or across a wireless network. (aka sniffing attack)






50. Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network. For example - an attacker might place a tap on a network line to intercept packets as they leave the computer. The attac