SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
glba
Macros
Proxy Server
Computer Forensics
2. An attacker motivated by the ideology to attack computer or infrastructure networks
Proxy Server
sarbox
Firewalls
cyberterrorist
3. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
glba
asset
Macros
cyberterrorism
4. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Trojan
cyberterrorist
Biometrics
asset
5. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
Firewalls
Spybot
cyberterrorist
Decryption
6. A process used by hackers to steal usernames and passwords online.
Decryption
Firewalls
cyberterrorism
Spoofing
7. A weakness that allows a threat agent to btpass security
Biometrics
Phishing
vulnerability
threat
8. Taking advantage of
threat
accounting
RAID
exploiting
9. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
script kiddies
Smart Card
Hackers
hipaa
10. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
hipaa
vulnerability
Macros
sarbox
11. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
vulnerability
Proxy Server
script kiddies
Firewalls
12. A person or thing that has the power to carry a threat
Smart Card
cyberterrorism
threat agent
exploiting
13. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
cybercriminals
hipaa
script kiddies
cyberterrorism
14. (n.) something of value; a resource; an advantage
cyberterrorism
confidentiality
Smart Card
asset
15. Ensures that only authorized parties can view the information
Decryption
Proxy Server
confidentiality
glba
16. A technology that uses multiple hard disk drives for increased reliability and performance
RAID
cyberterrorism
Smart Card
Spybot
17. A warning that one may do harm
exploiting
RAID
threat
integrity
18. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
availability
RAID
Biometrics
glba
19. Health Insurance Portability and Accountability Act
Hackers
threat
hipaa
cybercriminals
20. A program that appears desirable but actually contains something harmful
Phishing
integrity
accounting
Trojan
21. Software designed to infiltrate or damage a computer system without the user's informed consent
sarbox
Macros
Malware
asset
22. Gramm-Leach-Bliley Act
hackers
glba
threat
Spybot
23. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
Spybot
exploiting
RAID
cyberterrorism
24. People very knowledgeable about computers who use their knowledge to invade other people's computers.
Hackers
vulnerability
cyberterrorism
integrity
25. Planning - recording - and analyzing and interpreting financial information.
RAID
Proxy Server
accounting
cyberterrorism
26. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
integrity
threat
availability
cybercriminals
27. Ensures that data is available to authorized users
hackers
exploiting
Biometrics
availability
28. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
glba
Proxy Server
glba
Malware
29. The activity of making clear or converting from code into plain text
sarbox
Decryption
availability
threat
30. Very knowledgeable about computers who use their knowledge to invade other people's computers
cyberterrorist
glba
Decryption
hackers
31. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
cybercriminals
cyberterrorist
Smart Card
asset
32. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Computer Forensics
hackers
Phishing
script kiddies