SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Very knowledgeable about computers who use their knowledge to invade other people's computers
hackers
Phishing
cyberterrorist
Computer Forensics
2. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
vulnerability
sarbox
script kiddies
threat agent
3. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
RAID
Spybot
cyberterrorism
cybercriminals
4. Planning - recording - and analyzing and interpreting financial information.
accounting
threat
sarbox
Proxy Server
5. The activity of making clear or converting from code into plain text
Decryption
vulnerability
cybercriminals
glba
6. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
cyberterrorism
Firewalls
availability
Decryption
7. Software designed to infiltrate or damage a computer system without the user's informed consent
availability
Hackers
cyberterrorist
Malware
8. Taking advantage of
vulnerability
glba
exploiting
hackers
9. An attacker motivated by the ideology to attack computer or infrastructure networks
cyberterrorist
Biometrics
vulnerability
Computer Forensics
10. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
Spybot
Proxy Server
vulnerability
Smart Card
11. A person or thing that has the power to carry a threat
threat agent
glba
RAID
confidentiality
12. A technology that uses multiple hard disk drives for increased reliability and performance
integrity
threat agent
RAID
Firewalls
13. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
hackers
RAID
threat agent
14. (n.) something of value; a resource; an advantage
Trojan
Hackers
Computer Forensics
asset
15. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
RAID
cybercriminals
cyberterrorist
Biometrics
16. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Biometrics
Proxy Server
cyberterrorist
Spybot
17. Health Insurance Portability and Accountability Act
vulnerability
Spoofing
hipaa
script kiddies
18. Ensures that only authorized parties can view the information
Spoofing
Proxy Server
sarbox
confidentiality
19. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
Macros
Smart Card
Decryption
Malware
20. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
availability
sarbox
vulnerability
Macros
21. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
script kiddies
glba
vulnerability
Decryption
22. A warning that one may do harm
Trojan
threat
integrity
cyberterrorist
23. Ensures that data is available to authorized users
Spoofing
Biometrics
threat agent
availability
24. Gramm-Leach-Bliley Act
glba
Spybot
availability
Smart Card
25. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
glba
Firewalls
sarbox
Malware
26. A process used by hackers to steal usernames and passwords online.
Spoofing
cyberterrorism
availability
Decryption
27. A program that appears desirable but actually contains something harmful
Computer Forensics
confidentiality
Trojan
Hackers
28. A weakness that allows a threat agent to btpass security
vulnerability
Smart Card
cyberterrorism
Hackers
29. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
Spoofing
Smart Card
Computer Forensics
Trojan
30. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
integrity
Decryption
Spybot
Spoofing
31. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
Decryption
Phishing
cyberterrorist
script kiddies
32. People very knowledgeable about computers who use their knowledge to invade other people's computers.
threat
glba
Decryption
Hackers