SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
accounting
Phishing
RAID
Spybot
2. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
threat
sarbox
Biometrics
threat agent
3. Software designed to infiltrate or damage a computer system without the user's informed consent
Malware
cyberterrorist
accounting
Macros
4. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
glba
Computer Forensics
hipaa
integrity
5. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
Decryption
vulnerability
exploiting
script kiddies
6. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
Spybot
Macros
glba
sarbox
7. People very knowledgeable about computers who use their knowledge to invade other people's computers.
Hackers
confidentiality
Spybot
accounting
8. A person or thing that has the power to carry a threat
threat agent
integrity
glba
RAID
9. A weakness that allows a threat agent to btpass security
Hackers
hackers
availability
vulnerability
10. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
cybercriminals
Spoofing
glba
Firewalls
11. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
accounting
cyberterrorism
cybercriminals
glba
12. Health Insurance Portability and Accountability Act
hackers
sarbox
hipaa
Spybot
13. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
cyberterrorism
availability
hipaa
Firewalls
14. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
hipaa
glba
cyberterrorism
availability
15. Taking advantage of
exploiting
glba
accounting
hipaa
16. Ensures that data is available to authorized users
cybercriminals
threat
glba
availability
17. (n.) something of value; a resource; an advantage
Computer Forensics
Malware
asset
Firewalls
18. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
Proxy Server
availability
Spybot
Macros
19. A technology that uses multiple hard disk drives for increased reliability and performance
Macros
exploiting
cyberterrorist
RAID
20. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
Smart Card
Decryption
Macros
asset
21. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
cyberterrorist
Computer Forensics
Spybot
threat agent
22. An attacker motivated by the ideology to attack computer or infrastructure networks
cyberterrorist
Decryption
Computer Forensics
availability
23. A program that appears desirable but actually contains something harmful
glba
Smart Card
Trojan
Computer Forensics
24. Ensures that only authorized parties can view the information
Biometrics
confidentiality
asset
threat agent
25. Planning - recording - and analyzing and interpreting financial information.
sarbox
Macros
Spybot
accounting
26. Very knowledgeable about computers who use their knowledge to invade other people's computers
hackers
Macros
integrity
Firewalls
27. The activity of making clear or converting from code into plain text
Computer Forensics
glba
Decryption
Malware
28. A warning that one may do harm
Firewalls
cyberterrorism
glba
threat
29. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
asset
Spybot
Proxy Server
integrity
30. A process used by hackers to steal usernames and passwords online.
Spoofing
integrity
Firewalls
cybercriminals
31. Gramm-Leach-Bliley Act
Decryption
glba
sarbox
threat agent
32. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
hackers
Spybot
Spoofing
cyberterrorism