SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
Smart Card
RAID
asset
exploiting
2. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
glba
cybercriminals
Macros
sarbox
3. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
cyberterrorism
availability
Macros
hipaa
4. A person or thing that has the power to carry a threat
threat agent
Firewalls
Spybot
vulnerability
5. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Biometrics
threat
script kiddies
Phishing
6. Health Insurance Portability and Accountability Act
hackers
availability
hipaa
cyberterrorist
7. Ensures that data is available to authorized users
exploiting
RAID
availability
sarbox
8. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
Decryption
Spybot
Smart Card
cybercriminals
9. (n.) something of value; a resource; an advantage
asset
cybercriminals
threat agent
exploiting
10. Very knowledgeable about computers who use their knowledge to invade other people's computers
confidentiality
exploiting
Macros
hackers
11. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
cybercriminals
Proxy Server
RAID
exploiting
12. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
threat
Macros
glba
availability
13. A process used by hackers to steal usernames and passwords online.
Smart Card
sarbox
cybercriminals
Spoofing
14. Ensures that only authorized parties can view the information
availability
confidentiality
exploiting
sarbox
15. A technology that uses multiple hard disk drives for increased reliability and performance
cyberterrorist
Malware
RAID
Computer Forensics
16. Taking advantage of
hackers
cybercriminals
cyberterrorist
exploiting
17. An attacker motivated by the ideology to attack computer or infrastructure networks
threat agent
cyberterrorist
script kiddies
glba
18. People very knowledgeable about computers who use their knowledge to invade other people's computers.
Computer Forensics
Hackers
script kiddies
cyberterrorism
19. A warning that one may do harm
Malware
Firewalls
threat
sarbox
20. Software designed to infiltrate or damage a computer system without the user's informed consent
cyberterrorism
Spybot
Malware
vulnerability
21. Planning - recording - and analyzing and interpreting financial information.
accounting
cyberterrorism
Malware
cybercriminals
22. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
Trojan
sarbox
vulnerability
Firewalls
23. A weakness that allows a threat agent to btpass security
Decryption
Spoofing
integrity
vulnerability
24. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Phishing
Biometrics
Spybot
threat
25. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
cybercriminals
Firewalls
Spybot
Decryption
26. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
Computer Forensics
Proxy Server
exploiting
cybercriminals
27. A program that appears desirable but actually contains something harmful
Trojan
confidentiality
Spoofing
cybercriminals
28. Gramm-Leach-Bliley Act
cyberterrorist
Proxy Server
glba
Biometrics
29. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
Proxy Server
hipaa
integrity
glba
30. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
Spybot
confidentiality
availability
Decryption
31. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
threat agent
Macros
script kiddies
hackers
32. The activity of making clear or converting from code into plain text
Decryption
cyberterrorism
hipaa
Malware