SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
cybercriminals
Smart Card
glba
Proxy Server
2. A person or thing that has the power to carry a threat
exploiting
threat agent
asset
Hackers
3. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
hackers
sarbox
cybercriminals
Macros
4. A warning that one may do harm
hipaa
glba
Macros
threat
5. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
integrity
Biometrics
Spybot
Malware
6. Gramm-Leach-Bliley Act
glba
RAID
Decryption
cyberterrorism
7. A program that appears desirable but actually contains something harmful
glba
Hackers
Trojan
RAID
8. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
glba
Biometrics
vulnerability
cyberterrorism
9. Health Insurance Portability and Accountability Act
availability
hipaa
accounting
vulnerability
10. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
Computer Forensics
Spybot
Spoofing
Trojan
11. Ensures that data is available to authorized users
accounting
Trojan
cybercriminals
availability
12. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
cybercriminals
Decryption
Proxy Server
cyberterrorism
13. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
integrity
Smart Card
hipaa
Biometrics
14. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
glba
Phishing
Smart Card
Computer Forensics
15. Very knowledgeable about computers who use their knowledge to invade other people's computers
hackers
cybercriminals
cyberterrorism
threat
16. The activity of making clear or converting from code into plain text
Malware
integrity
script kiddies
Decryption
17. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
RAID
Malware
Macros
Biometrics
18. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
script kiddies
Decryption
Spybot
Biometrics
19. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
Macros
Firewalls
threat agent
cyberterrorism
20. An attacker motivated by the ideology to attack computer or infrastructure networks
confidentiality
cyberterrorist
threat
Macros
21. People very knowledgeable about computers who use their knowledge to invade other people's computers.
cyberterrorism
Decryption
Malware
Hackers
22. Planning - recording - and analyzing and interpreting financial information.
Computer Forensics
Hackers
Smart Card
accounting
23. A process used by hackers to steal usernames and passwords online.
Spoofing
confidentiality
Malware
Biometrics
24. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
cyberterrorist
accounting
script kiddies
Computer Forensics
25. A technology that uses multiple hard disk drives for increased reliability and performance
Malware
Computer Forensics
script kiddies
RAID
26. (n.) something of value; a resource; an advantage
asset
hackers
Hackers
threat agent
27. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
exploiting
integrity
confidentiality
Phishing
28. Taking advantage of
cybercriminals
exploiting
Phishing
cyberterrorist
29. Ensures that only authorized parties can view the information
Computer Forensics
confidentiality
threat agent
Decryption
30. Software designed to infiltrate or damage a computer system without the user's informed consent
cyberterrorism
Malware
hipaa
Trojan
31. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
glba
hipaa
cybercriminals
Computer Forensics
32. A weakness that allows a threat agent to btpass security
vulnerability
cybercriminals
integrity
glba