Test your basic knowledge |

Network Security Basics

Subject : it-skills
Instructions:
  • Answer 32 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technology that uses multiple hard disk drives for increased reliability and performance






2. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information






3. Health Insurance Portability and Accountability Act






4. Ensures that data is available to authorized users






5. A program that appears desirable but actually contains something harmful






6. (n.) something of value; a resource; an advantage






7. Very knowledgeable about computers who use their knowledge to invade other people's computers






8. The activity of making clear or converting from code into plain text






9. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers






10. A process used by hackers to steal usernames and passwords online.






11. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re






12. Ensures that the information is correct and no unauthorized person or malicious software has altered that data






13. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor






14. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online






15. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail






16. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.






17. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected






18. Ensures that only authorized parties can view the information






19. Gramm-Leach-Bliley Act






20. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person






21. People very knowledgeable about computers who use their knowledge to invade other people's computers.






22. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents






23. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions






24. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of






25. An attacker motivated by the ideology to attack computer or infrastructure networks






26. A weakness that allows a threat agent to btpass security






27. Planning - recording - and analyzing and interpreting financial information.






28. Taking advantage of






29. A person or thing that has the power to carry a threat






30. A warning that one may do harm






31. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of






32. Software designed to infiltrate or damage a computer system without the user's informed consent






Sorry, Topic not found.:)Seach or Brouse Basicversity:


Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT
//