Internet Knowledge
Information Security I
Information Security II
Information Security III
Information Security IV
100

Web page formatting is typically done using this.

That is HTML

100

This is a type of agreement, document or contract that defines acceptable and unacceptable uses of computers and network resources for an organization.

That is a Netowork usage policy

100

The 2002 law designed to fight corporate corruption by imposing tough reporting requirements and internal controls on electronic financial records.

That is Sarbanes-Oxley

100

A person with advanced computer and network skills who gains illegal entry to a computer system to destroy data, steal information or cause others harm.

That is a Cracker

100

Using a network to destroy or damage computer systems for political reasons' usually requires years of planning, lots of money, and a team of skilled people.

That is Cyberterrorism.

200

A typed messages sent from one user to another over the Internet that does not require the users to be online at the same time to exchange communications.

That is E-mail

200

The destructive outcome from a computer virus or worm.

That is It's payload.

200

Access ID card, fingerprints and something you know are all examples of this.

That are forms or user authentication

200

A person who uses a microcomputer system or terminal to penetrate the security of a remoter computer system, usually for the thrill or bragging rights.

That is a Hacker

200

A person who accesses a computer system with malicious intent but does not have the requisite technical skills to be successful.

That is Script Kiddie

300

Your computer needs a unique one of these to connect to the internet.

That is an IP Address

300

When a person is tricked into giving up private information that can be used for identity theft, they have become a victim of this.

That is Fishing

300

When you only back up files that have changed since the last time you did a backup, you perform this.

That is Incremental backup.

300

Unauthorized copying or use of computer programs.

That is Software Piracy

300

Manipulating programs or data so that many small dollar amounts are taken from a large volume of transactions or accounts and accumulated elsewhere.

That is Salami Shaving.

400

Process of placing telephone calles via the internet; Skype for example.

That is Voice over the Internet (VOIP)

400

True or false: myC@T8amouse is a strong password.

True

400

An electronic "card: sent with Internet transaction data to verify the sender.

That is an SSL certificate

400

Similar to a worm, this type of program requires a host such as email to be transmitted; tile must be opened in order for the program to perform its payload.

That is a Virus

400

Programs or short code segments designed to commit a malicious act as soon as the unsuspecting program user performs some specific operation, such as deleting a record, or pressing certain keys.

That is Logic/Time Bombs.

500

Limewire is an example of this type of network (and was recently ordered to shut down for copyright infringement)

That is P2P

500

The area of law enforcement that focuses on information security.

That is Computer forensics

500

A computer that carries out actions-often malicious-under remote control of a hacker or bot-herder.

That is a Zombie

500

Adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties.

That is a Trojan Horse.

500

Self-replicating software program designed to enter a computer system or network through security holes.

That is a Worm