SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
Spybot
Phishing
Macros
accounting
2. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
availability
Computer Forensics
hackers
script kiddies
3. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
asset
Computer Forensics
sarbox
confidentiality
4. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
availability
confidentiality
asset
Phishing
5. People very knowledgeable about computers who use their knowledge to invade other people's computers.
Spybot
sarbox
threat agent
Hackers
6. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
asset
cyberterrorist
script kiddies
Smart Card
7. A person or thing that has the power to carry a threat
Macros
threat agent
cybercriminals
vulnerability
8. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
vulnerability
Proxy Server
Smart Card
Spybot
9. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
Macros
Proxy Server
Hackers
Firewalls
10. Ensures that only authorized parties can view the information
confidentiality
cybercriminals
glba
threat
11. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Biometrics
cyberterrorism
integrity
Malware
12. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
cybercriminals
exploiting
accounting
Spoofing
13. A program that appears desirable but actually contains something harmful
Trojan
Firewalls
Malware
Proxy Server
14. A weakness that allows a threat agent to btpass security
cyberterrorist
availability
confidentiality
vulnerability
15. Taking advantage of
exploiting
Trojan
threat agent
Biometrics
16. A technology that uses multiple hard disk drives for increased reliability and performance
RAID
Firewalls
sarbox
script kiddies
17. A process used by hackers to steal usernames and passwords online.
threat agent
threat
Trojan
Spoofing
18. A warning that one may do harm
threat
integrity
vulnerability
availability
19. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
vulnerability
Macros
RAID
Proxy Server
20. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
glba
Malware
RAID
availability
21. The activity of making clear or converting from code into plain text
Macros
Decryption
confidentiality
exploiting
22. Planning - recording - and analyzing and interpreting financial information.
accounting
Spybot
cyberterrorist
availability
23. (n.) something of value; a resource; an advantage
Smart Card
Proxy Server
RAID
asset
24. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
Trojan
cyberterrorism
glba
Computer Forensics
25. Gramm-Leach-Bliley Act
hipaa
glba
confidentiality
Spybot
26. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
sarbox
asset
Smart Card
confidentiality
27. An attacker motivated by the ideology to attack computer or infrastructure networks
Spybot
Spoofing
cyberterrorist
Hackers
28. Software designed to infiltrate or damage a computer system without the user's informed consent
sarbox
Malware
Macros
Trojan
29. Health Insurance Portability and Accountability Act
hipaa
vulnerability
integrity
Phishing
30. Ensures that data is available to authorized users
Spoofing
availability
Biometrics
RAID
31. Very knowledgeable about computers who use their knowledge to invade other people's computers
hackers
Spybot
exploiting
Smart Card
32. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
integrity
script kiddies
Hackers
Proxy Server