SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
Macros
hackers
Spybot
threat agent
2. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
Hackers
glba
hackers
accounting
3. A technology that uses multiple hard disk drives for increased reliability and performance
RAID
Firewalls
vulnerability
hackers
4. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Biometrics
cyberterrorism
Computer Forensics
Trojan
5. A warning that one may do harm
Hackers
accounting
threat
Phishing
6. A person or thing that has the power to carry a threat
threat agent
Spoofing
hackers
cyberterrorist
7. Gramm-Leach-Bliley Act
Spybot
cyberterrorism
glba
script kiddies
8. Ensures that only authorized parties can view the information
sarbox
confidentiality
hipaa
Hackers
9. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
Biometrics
asset
exploiting
Spybot
10. Software designed to infiltrate or damage a computer system without the user's informed consent
Malware
Spybot
threat agent
cyberterrorism
11. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
Computer Forensics
threat agent
accounting
12. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
script kiddies
sarbox
hipaa
Firewalls
13. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
threat agent
Computer Forensics
script kiddies
glba
14. Planning - recording - and analyzing and interpreting financial information.
accounting
vulnerability
Computer Forensics
Spybot
15. Ensures that data is available to authorized users
Proxy Server
sarbox
RAID
availability
16. A weakness that allows a threat agent to btpass security
vulnerability
Smart Card
integrity
asset
17. A program that appears desirable but actually contains something harmful
Trojan
script kiddies
Biometrics
integrity
18. A process used by hackers to steal usernames and passwords online.
asset
confidentiality
cyberterrorism
Spoofing
19. Health Insurance Portability and Accountability Act
Spoofing
hipaa
availability
Trojan
20. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
Malware
Decryption
availability
script kiddies
21. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
Macros
Proxy Server
threat
cyberterrorism
22. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
Spybot
integrity
availability
accounting
23. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
cybercriminals
Spoofing
threat agent
Smart Card
24. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
threat
cybercriminals
cyberterrorism
Phishing
25. An attacker motivated by the ideology to attack computer or infrastructure networks
availability
Proxy Server
cyberterrorist
RAID
26. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
hackers
Proxy Server
threat
Smart Card
27. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
Malware
Firewalls
cybercriminals
sarbox
28. Taking advantage of
asset
cyberterrorism
Proxy Server
exploiting
29. People very knowledgeable about computers who use their knowledge to invade other people's computers.
Trojan
confidentiality
Decryption
Hackers
30. The activity of making clear or converting from code into plain text
vulnerability
cybercriminals
Decryption
glba
31. Very knowledgeable about computers who use their knowledge to invade other people's computers
integrity
exploiting
Smart Card
hackers
32. (n.) something of value; a resource; an advantage
accounting
Spybot
asset
hipaa