SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
Macros
Biometrics
glba
glba
2. A warning that one may do harm
threat
Proxy Server
Decryption
glba
3. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
hackers
integrity
glba
exploiting
4. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
script kiddies
hipaa
Biometrics
cyberterrorism
5. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
accounting
hipaa
Phishing
Computer Forensics
6. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
Proxy Server
Hackers
confidentiality
sarbox
7. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
hackers
accounting
Macros
Computer Forensics
8. Very knowledgeable about computers who use their knowledge to invade other people's computers
script kiddies
cyberterrorism
Macros
hackers
9. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
Spoofing
Smart Card
Macros
sarbox
10. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
accounting
script kiddies
glba
Trojan
11. (n.) something of value; a resource; an advantage
Firewalls
threat
asset
RAID
12. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
Spybot
Malware
availability
Smart Card
13. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Biometrics
confidentiality
exploiting
asset
14. People very knowledgeable about computers who use their knowledge to invade other people's computers.
hipaa
cyberterrorist
Hackers
asset
15. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
availability
sarbox
script kiddies
Computer Forensics
16. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
hipaa
accounting
Proxy Server
Computer Forensics
17. A process used by hackers to steal usernames and passwords online.
Spoofing
Firewalls
hipaa
Smart Card
18. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
confidentiality
Macros
Firewalls
exploiting
19. Planning - recording - and analyzing and interpreting financial information.
Computer Forensics
integrity
cybercriminals
accounting
20. Software designed to infiltrate or damage a computer system without the user's informed consent
Macros
Malware
glba
cyberterrorism
21. A weakness that allows a threat agent to btpass security
glba
vulnerability
Biometrics
RAID
22. Ensures that only authorized parties can view the information
vulnerability
confidentiality
Macros
hackers
23. Taking advantage of
Decryption
exploiting
cyberterrorist
Proxy Server
24. An attacker motivated by the ideology to attack computer or infrastructure networks
Computer Forensics
Spybot
Decryption
cyberterrorist
25. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
script kiddies
Proxy Server
asset
cybercriminals
26. A technology that uses multiple hard disk drives for increased reliability and performance
Malware
Firewalls
accounting
RAID
27. Health Insurance Portability and Accountability Act
Macros
hipaa
glba
Smart Card
28. A program that appears desirable but actually contains something harmful
hipaa
confidentiality
Trojan
glba
29. The activity of making clear or converting from code into plain text
Proxy Server
Decryption
Phishing
Spoofing
30. Ensures that data is available to authorized users
threat
availability
threat agent
Decryption
31. A person or thing that has the power to carry a threat
vulnerability
integrity
script kiddies
threat agent
32. Gramm-Leach-Bliley Act
glba
Firewalls
cyberterrorism
asset