SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technology that uses multiple hard disk drives for increased reliability and performance
Decryption
Smart Card
RAID
Firewalls
2. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
sarbox
Macros
Decryption
vulnerability
3. Gramm-Leach-Bliley Act
Malware
glba
Smart Card
Proxy Server
4. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
cybercriminals
Firewalls
Phishing
vulnerability
5. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
Spybot
integrity
vulnerability
Firewalls
6. Ensures that data is available to authorized users
Trojan
Smart Card
sarbox
availability
7. (n.) something of value; a resource; an advantage
Hackers
asset
Trojan
glba
8. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
Spoofing
Firewalls
RAID
threat agent
9. Taking advantage of
cybercriminals
asset
Smart Card
exploiting
10. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
glba
Biometrics
Proxy Server
cybercriminals
11. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
cyberterrorism
Biometrics
threat agent
Smart Card
12. An attacker motivated by the ideology to attack computer or infrastructure networks
Proxy Server
RAID
sarbox
cyberterrorist
13. A weakness that allows a threat agent to btpass security
sarbox
vulnerability
Trojan
availability
14. Planning - recording - and analyzing and interpreting financial information.
threat
RAID
accounting
Hackers
15. The activity of making clear or converting from code into plain text
hackers
cybercriminals
Decryption
Phishing
16. Health Insurance Portability and Accountability Act
Spybot
exploiting
hipaa
vulnerability
17. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
exploiting
cybercriminals
threat
sarbox
18. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
cybercriminals
script kiddies
threat agent
hackers
19. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
RAID
glba
hackers
Decryption
20. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Decryption
script kiddies
Phishing
Biometrics
21. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
Computer Forensics
Hackers
Malware
hipaa
22. Very knowledgeable about computers who use their knowledge to invade other people's computers
Phishing
hackers
glba
Macros
23. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
cybercriminals
cyberterrorism
Spybot
confidentiality
24. A person or thing that has the power to carry a threat
integrity
cyberterrorism
Smart Card
threat agent
25. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
Phishing
sarbox
integrity
Biometrics
26. A warning that one may do harm
sarbox
Phishing
RAID
threat
27. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
availability
Smart Card
Macros
cyberterrorism
28. A program that appears desirable but actually contains something harmful
threat agent
Trojan
accounting
Computer Forensics
29. A process used by hackers to steal usernames and passwords online.
glba
asset
Spoofing
confidentiality
30. Software designed to infiltrate or damage a computer system without the user's informed consent
glba
Firewalls
Malware
glba
31. Ensures that only authorized parties can view the information
Biometrics
confidentiality
threat
hipaa
32. People very knowledgeable about computers who use their knowledge to invade other people's computers.
Macros
Biometrics
Smart Card
Hackers