SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
Smart Card
Biometrics
cyberterrorist
Computer Forensics
2. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
Biometrics
script kiddies
Proxy Server
cybercriminals
3. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
Biometrics
sarbox
Firewalls
glba
4. Taking advantage of
asset
exploiting
accounting
cyberterrorist
5. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
Phishing
RAID
Proxy Server
cyberterrorism
6. Health Insurance Portability and Accountability Act
Spoofing
availability
exploiting
hipaa
7. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
script kiddies
availability
asset
Biometrics
8. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
vulnerability
threat agent
cybercriminals
integrity
9. The activity of making clear or converting from code into plain text
threat agent
Proxy Server
glba
Decryption
10. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
Firewalls
cyberterrorism
RAID
Macros
11. A technology that uses multiple hard disk drives for increased reliability and performance
glba
RAID
threat
Spoofing
12. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Trojan
script kiddies
Biometrics
glba
13. (n.) something of value; a resource; an advantage
asset
exploiting
threat agent
Proxy Server
14. A process used by hackers to steal usernames and passwords online.
glba
Decryption
Trojan
Spoofing
15. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
Phishing
Hackers
cyberterrorism
threat agent
16. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
Firewalls
sarbox
Trojan
Computer Forensics
17. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
confidentiality
Biometrics
threat agent
sarbox
18. Planning - recording - and analyzing and interpreting financial information.
exploiting
Biometrics
accounting
Hackers
19. Software designed to infiltrate or damage a computer system without the user's informed consent
vulnerability
Malware
threat agent
Decryption
20. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
Macros
cybercriminals
exploiting
accounting
21. A warning that one may do harm
availability
Firewalls
threat
Biometrics
22. Ensures that data is available to authorized users
Smart Card
threat
Computer Forensics
availability
23. A program that appears desirable but actually contains something harmful
accounting
Spybot
Trojan
Proxy Server
24. An attacker motivated by the ideology to attack computer or infrastructure networks
cyberterrorism
script kiddies
cyberterrorist
Hackers
25. Gramm-Leach-Bliley Act
availability
glba
Macros
Spybot
26. A person or thing that has the power to carry a threat
integrity
Computer Forensics
threat
threat agent
27. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Computer Forensics
RAID
glba
Phishing
28. Ensures that only authorized parties can view the information
Macros
Hackers
confidentiality
script kiddies
29. People very knowledgeable about computers who use their knowledge to invade other people's computers.
vulnerability
Trojan
availability
Hackers
30. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
Computer Forensics
hipaa
Smart Card
Spybot
31. A weakness that allows a threat agent to btpass security
RAID
cyberterrorism
vulnerability
Decryption
32. Very knowledgeable about computers who use their knowledge to invade other people's computers
Macros
glba
Proxy Server
hackers