SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technology that uses multiple hard disk drives for increased reliability and performance
RAID
exploiting
cyberterrorist
accounting
2. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
threat agent
script kiddies
vulnerability
Firewalls
3. Health Insurance Portability and Accountability Act
RAID
cyberterrorism
threat
hipaa
4. Ensures that data is available to authorized users
script kiddies
availability
threat
exploiting
5. A program that appears desirable but actually contains something harmful
Spybot
Hackers
threat
Trojan
6. (n.) something of value; a resource; an advantage
sarbox
asset
Firewalls
Spoofing
7. Very knowledgeable about computers who use their knowledge to invade other people's computers
hackers
RAID
Smart Card
hipaa
8. The activity of making clear or converting from code into plain text
script kiddies
Spoofing
Decryption
Biometrics
9. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
Macros
sarbox
cybercriminals
accounting
10. A process used by hackers to steal usernames and passwords online.
accounting
Spoofing
glba
Macros
11. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
Computer Forensics
hipaa
hackers
cybercriminals
12. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
Smart Card
cyberterrorist
confidentiality
integrity
13. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
Smart Card
hackers
glba
accounting
14. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
Spybot
asset
Phishing
Decryption
15. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
Spoofing
Phishing
Hackers
cybercriminals
16. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
Smart Card
Phishing
Proxy Server
hackers
17. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
RAID
Phishing
Macros
Firewalls
18. Ensures that only authorized parties can view the information
Decryption
Smart Card
exploiting
confidentiality
19. Gramm-Leach-Bliley Act
Macros
Trojan
glba
Malware
20. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Macros
availability
Biometrics
script kiddies
21. People very knowledgeable about computers who use their knowledge to invade other people's computers.
sarbox
Spybot
Computer Forensics
Hackers
22. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
RAID
Decryption
Malware
cyberterrorism
23. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
asset
glba
Biometrics
script kiddies
24. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
confidentiality
accounting
script kiddies
RAID
25. An attacker motivated by the ideology to attack computer or infrastructure networks
cybercriminals
cyberterrorist
availability
Malware
26. A weakness that allows a threat agent to btpass security
Spybot
Decryption
Malware
vulnerability
27. Planning - recording - and analyzing and interpreting financial information.
cybercriminals
accounting
Smart Card
hipaa
28. Taking advantage of
vulnerability
exploiting
availability
hackers
29. A person or thing that has the power to carry a threat
Phishing
script kiddies
Smart Card
threat agent
30. A warning that one may do harm
threat
threat agent
Biometrics
Computer Forensics
31. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
sarbox
Trojan
Macros
hipaa
32. Software designed to infiltrate or damage a computer system without the user's informed consent
Malware
asset
Computer Forensics
glba
Sorry, Topic not found.:)Seach or Brouse Basicversity:
Search
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests
//
//