SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
Biometrics
accounting
RAID
Computer Forensics
2. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
glba
Malware
Biometrics
cyberterrorism
3. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
script kiddies
threat agent
cyberterrorism
glba
4. A program that appears desirable but actually contains something harmful
RAID
Computer Forensics
threat agent
Trojan
5. Taking advantage of
exploiting
availability
RAID
glba
6. People very knowledgeable about computers who use their knowledge to invade other people's computers.
glba
Hackers
RAID
hipaa
7. A weakness that allows a threat agent to btpass security
Hackers
vulnerability
glba
exploiting
8. Health Insurance Portability and Accountability Act
hipaa
glba
Spoofing
Smart Card
9. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
glba
Decryption
integrity
glba
10. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
vulnerability
availability
Proxy Server
Biometrics
11. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
Firewalls
script kiddies
Malware
Smart Card
12. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
Biometrics
Proxy Server
glba
sarbox
13. Very knowledgeable about computers who use their knowledge to invade other people's computers
Spybot
Malware
Macros
hackers
14. Software designed to infiltrate or damage a computer system without the user's informed consent
RAID
Computer Forensics
Hackers
Malware
15. Gramm-Leach-Bliley Act
Firewalls
Spoofing
integrity
glba
16. Ensures that only authorized parties can view the information
vulnerability
availability
confidentiality
threat agent
17. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
Proxy Server
cyberterrorism
Phishing
cybercriminals
18. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
cybercriminals
cyberterrorist
sarbox
Spybot
19. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
vulnerability
threat agent
confidentiality
Firewalls
20. The activity of making clear or converting from code into plain text
RAID
Decryption
vulnerability
threat agent
21. A person or thing that has the power to carry a threat
integrity
Biometrics
threat agent
Malware
22. (n.) something of value; a resource; an advantage
sarbox
Proxy Server
Smart Card
asset
23. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
Decryption
glba
cybercriminals
glba
24. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
asset
glba
Smart Card
Phishing
25. Ensures that data is available to authorized users
availability
Phishing
Macros
Malware
26. A process used by hackers to steal usernames and passwords online.
Hackers
threat
confidentiality
Spoofing
27. An attacker motivated by the ideology to attack computer or infrastructure networks
Biometrics
cybercriminals
cyberterrorist
hipaa
28. A warning that one may do harm
Proxy Server
threat
Smart Card
RAID
29. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
Malware
exploiting
hipaa
Macros
30. Planning - recording - and analyzing and interpreting financial information.
Firewalls
exploiting
accounting
hackers
31. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
Biometrics
glba
cybercriminals
Smart Card
32. A technology that uses multiple hard disk drives for increased reliability and performance
Hackers
hackers
RAID
cyberterrorism