SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
sarbox
Computer Forensics
hipaa
script kiddies
2. Taking advantage of
exploiting
glba
cyberterrorism
asset
3. Very knowledgeable about computers who use their knowledge to invade other people's computers
accounting
Spoofing
sarbox
hackers
4. A process used by hackers to steal usernames and passwords online.
cyberterrorism
Spoofing
Phishing
Spybot
5. A warning that one may do harm
sarbox
availability
threat
Biometrics
6. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
threat
Proxy Server
Spoofing
cybercriminals
7. A weakness that allows a threat agent to btpass security
hackers
vulnerability
exploiting
Hackers
8. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
threat agent
asset
cyberterrorist
Proxy Server
9. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
cyberterrorism
Firewalls
Proxy Server
RAID
10. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
availability
Macros
hackers
integrity
11. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
cyberterrorism
cybercriminals
glba
Hackers
12. Ensures that only authorized parties can view the information
threat agent
cyberterrorism
confidentiality
Phishing
13. Health Insurance Portability and Accountability Act
hipaa
accounting
sarbox
script kiddies
14. Planning - recording - and analyzing and interpreting financial information.
Computer Forensics
threat
threat agent
accounting
15. The activity of making clear or converting from code into plain text
hipaa
confidentiality
script kiddies
Decryption
16. Ensures that data is available to authorized users
glba
availability
vulnerability
script kiddies
17. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Smart Card
Biometrics
Computer Forensics
threat
18. A technology that uses multiple hard disk drives for increased reliability and performance
RAID
Biometrics
threat agent
Malware
19. People very knowledgeable about computers who use their knowledge to invade other people's computers.
Hackers
Trojan
integrity
threat
20. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
hipaa
Phishing
threat agent
Smart Card
21. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
RAID
threat
Spybot
Firewalls
22. (n.) something of value; a resource; an advantage
script kiddies
asset
Spoofing
exploiting
23. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
Firewalls
cyberterrorist
integrity
Computer Forensics
24. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
threat
Macros
Trojan
Spybot
25. A person or thing that has the power to carry a threat
Smart Card
integrity
asset
threat agent
26. Software designed to infiltrate or damage a computer system without the user's informed consent
asset
Malware
Macros
Hackers
27. Gramm-Leach-Bliley Act
Spoofing
hipaa
glba
confidentiality
28. A program that appears desirable but actually contains something harmful
Computer Forensics
threat agent
Trojan
Macros
29. An attacker motivated by the ideology to attack computer or infrastructure networks
cybercriminals
cyberterrorist
hipaa
Computer Forensics
30. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
glba
vulnerability
Biometrics
cyberterrorist
31. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
sarbox
glba
glba
script kiddies
32. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
RAID
Smart Card
threat
hipaa