SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Network Security Basics
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 32 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user.
confidentiality
Proxy Server
threat agent
Computer Forensics
2. A weakness that allows a threat agent to btpass security
Malware
Computer Forensics
threat agent
vulnerability
3. Ensures that the information is correct and no unauthorized person or malicious software has altered that data
cyberterrorist
cybercriminals
integrity
Computer Forensics
4. A person or thing that has the power to carry a threat
hipaa
threat agent
confidentiality
Biometrics
5. Taking advantage of
integrity
glba
exploiting
threat
6. A warning that one may do harm
sarbox
Decryption
threat
confidentiality
7. Gramm-Leach-Bliley Act
Smart Card
glba
script kiddies
cyberterrorist
8. Premeditated - politically motivated attacks against computers and networks - affecting non-combatant targets - by sub-national groups or clandestine agents
Phishing
Macros
cyberterrorism
exploiting
9. Hardware - software - or both designed to prevent unauthorized persons from accessing electronic information
Firewalls
availability
Computer Forensics
script kiddies
10. Gathers information and communicates this information to an outsider via the Internet; can monitor your activity online
Spybot
availability
hackers
Smart Card
11. A technique to gain personal information for the purpose of identity theft - usually by means of fraudulent e-mail
RAID
script kiddies
Phishing
integrity
12. A program that appears desirable but actually contains something harmful
threat
Trojan
asset
Firewalls
13. Health Insurance Portability and Accountability Act
Trojan
cyberterrorist
hackers
hipaa
14. Software designed to infiltrate or damage a computer system without the user's informed consent
glba
Malware
hipaa
Computer Forensics
15. Unskilled users who want to break into computers to create damage. Download automated hacking software (scripts) from Web sites and use it to break into computers. They are sometimes considered more dangerous than hackers due to unlimited amounts of
script kiddies
Computer Forensics
Smart Card
Biometrics
16. Laws to ensure that there is honesty. 1. require the owners to sign the auditors note 2. penalties have become more severe 3. if you are on the board you are held accountable for what's going on in the company 4. limited CPA to only certain types of
asset
sarbox
threat agent
Proxy Server
17. The activity of making clear or converting from code into plain text
Decryption
cyberterrorist
Phishing
cybercriminals
18. Ensures that only authorized parties can view the information
confidentiality
integrity
Trojan
exploiting
19. Planning - recording - and analyzing and interpreting financial information.
Spybot
Hackers
glba
accounting
20. (n.) something of value; a resource; an advantage
integrity
Proxy Server
glba
asset
21. A technology that uses multiple hard disk drives for increased reliability and performance
RAID
Spoofing
Spybot
accounting
22. A process used by hackers to steal usernames and passwords online.
Spoofing
Trojan
cyberterrorism
glba
23. A loose-knit network of attackers - identity thieves - and financial fraudsters that are highly motivated - less risk-adverse - better funded - and more tenacious than hackers
vulnerability
cybercriminals
hackers
confidentiality
24. An attacker motivated by the ideology to attack computer or infrastructure networks
cyberterrorist
glba
Biometrics
Smart Card
25. Ensures that data is available to authorized users
sarbox
availability
Malware
integrity
26. Gramm-Leach-Bliley Act includes provisions to protect consumers personal financial information held by financial institutions
cyberterrorism
sarbox
Trojan
glba
27. People very knowledgeable about computers who use their knowledge to invade other people's computers.
Firewalls
Hackers
availability
Biometrics
28. The statistical analysis of biological data; the measurement and analysis of unique physical or behavioral characteristics to verify the identity of a person
Biometrics
Decryption
availability
Hackers
29. Are tools that allow a user to program repetitive tasks into the computer's memory so that they can be quickly accomplished with the touch of a couple of keys that the user has selected
sarbox
exploiting
Firewalls
Macros
30. Very knowledgeable about computers who use their knowledge to invade other people's computers
hackers
confidentiality
Spybot
Firewalls
31. Is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of identifying - preserving - re
threat agent
hackers
cyberterrorism
Computer Forensics
32. A plastic card containing a microprocessor that enables the holder to perform operations requiring data that is stored in the microprocessor
Smart Card
integrity
script kiddies
threat agent