SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
script kiddies
Proxy Server
Malware
confidentiality
2. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Phishing
Macros
cyberterrorism
Smart Card
3. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
script kiddies
Hackers
Computer Forensics
glba
4. A person or thing that has the power to carry a threat
threat agent
hackers
Macros
RAID
5. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
Firewalls
Proxy Server
threat
script kiddies
6. A weakness that allows a threat agent to btpass security
Firewalls
vulnerability
cyberterrorism
hipaa
7. Software designed to infiltrate or damage a computer system without the user's informed consent
Malware
script kiddies
integrity
RAID
8. Ensures that data is available to authorized users
threat
script kiddies
availability
hipaa
9. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
RAID
Smart Card
Phishing
hipaa
10. Planning - recording - and analyzing and interpreting financial information.
Malware
Decryption
Trojan
accounting
11. Taking advantage of
script kiddies
exploiting
vulnerability
Biometrics
12. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
script kiddies
Smart Card
integrity
Trojan
13. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
Biometrics
Spoofing
glba
exploiting
14. Health Insurance Portability and Accountability Act
hipaa
Proxy Server
Computer Forensics
Biometrics
15. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
glba
Spybot
glba
Macros
16. A program that appears desirable but actually contains something harmful
Spoofing
glba
threat
Trojan
17. A technology that uses multiple hard disk drives for increased reliability and performance
integrity
Smart Card
Malware
RAID
18. Gramm-Leach-Bliley Act
Smart Card
Biometrics
glba
exploiting
19. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
hackers
Biometrics
Proxy Server
Malware
20. A process used by hackers to steal usernames and passwords online.
glba
script kiddies
Spoofing
Macros
21. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
Proxy Server
cyberterrorism
RAID
cybercriminals
22. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
cybercriminals
exploiting
hackers
vulnerability
23. The activity of making clear or converting from code into plain text
script kiddies
Decryption
threat agent
Macros
24. A warning that one may do harm
threat agent
Trojan
sarbox
threat
25. People very knowledgeable about computers who use their knowledge to invade other people's computers.
confidentiality
RAID
Firewalls
Hackers
26. Ensures that only authorized parties can view the information
Spoofing
script kiddies
confidentiality
cyberterrorist
27. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
script kiddies
Macros
vulnerability
accounting
28. Very knowledgeable about computers who use their knowledge to invade other people's computers
hackers
accounting
Biometrics
script kiddies
29. An attacker motivated by the ideology to attack computer or infrastructure networks
hipaa
cyberterrorist
glba
Spybot
30. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
sarbox
Phishing
RAID
accounting
31. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
hipaa
integrity
Proxy Server
cyberterrorist
32. (n.) something of value; a resource; an advantage
script kiddies
asset
cybercriminals
Decryption