Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
|
SUBJECTS
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 30 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A process used by hackers to steal usernames and passwords online.
Spoofing
Computer Forensics
Decryption
Spybot
2. Ensures that data is available to authorized users
cybercriminals
availability
Spybot
sarbox
3. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
cyberterrorism
cyberterrorist
Macros
sarbox
4. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
Proxy Server
script kiddies
Trojan
Decryption
5. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
confidentiality
Spybot
Macros
glba
6. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
Firewalls
accounting
hackers
Decryption
7. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
Firewalls
Computer Forensics
glba
script kiddies
8. Software designed to infiltrate or damage a computer system without the user's informed consent
Malware
Decryption
hackers
threat
9. The activity of making clear or converting from code into plain text
Decryption
asset
Phishing
vulnerability
10. Ensures that only authorized parties can view the information
threat agent
Proxy Server
confidentiality
Spoofing
11. Planning - recording - and analyzing and interpreting financial information.
accounting
vulnerability
Smart Card
cyberterrorism
12. A weakness that allows a threat agent to btpass security
accounting
Trojan
vulnerability
cybercriminals
13. A program that appears desirable but actually contains something harmful
Trojan
cybercriminals
glba
Smart Card
14. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
Phishing
integrity
Macros
Decryption
15. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
RAID
integrity
Malware
threat agent
16. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Firewalls
vulnerability
Phishing
Proxy Server
17. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
Trojan
RAID
cyberterrorism
cybercriminals
18. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
Smart Card
Spybot
cyberterrorist
Spoofing
19. A technology that uses multiple hard disk drives for increased reliability and performance
integrity
Proxy Server
glba
RAID
20. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
script kiddies
Spoofing
sarbox
threat
21. An attacker motivated by the ideology to attack computer or infrastructure networks
exploiting
availability
cyberterrorist
Macros
22. People very knowledgeable about computers who use their knowledge to invade other people's computers.
script kiddies
Spoofing
sarbox
Hackers
23. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
glba
exploiting
sarbox
Malware
24. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Biometrics
cybercriminals
Hackers
integrity
25. A person or thing that has the power to carry a threat
threat agent
Decryption
Spoofing
vulnerability
26. Gramm-Leach-Bliley Act
RAID
Computer Forensics
cybercriminals
glba
27. A warning that one may do harm
threat
Malware
Macros
accounting
28. (n.) something of value; a resource; an advantage
Decryption
asset
Spybot
Malware
29. Health Insurance Portability and Accountability Act
Firewalls
hipaa
sarbox
Spoofing
30. Very knowledgeable about computers who use their knowledge to invade other people's computers
hackers
glba
Malware
Phishing
31. Taking advantage of
exploiting
Decryption
script kiddies
asset
32. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
cybercriminals
Spybot
Spoofing
Phishing