Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Information Security Test

Enter the letter for the matching Definition
incorrect
1.
Authentication
incorrect
2.
Passphrase
incorrect
3.
Zombies (bots)
incorrect
4.
Personal firewall
incorrect
5.
Physical controls
incorrect
6.
Antispyware
incorrect
7.
Electronic surveillance
incorrect
8.
Public-key encryption
incorrect
9.
Trusted network
incorrect
10.
Password
incorrect
11.
Anti-malware
incorrect
12.
Virus
incorrect
13.
Phishing
incorrect
14.
Public right to know
incorrect
15.
Opt-out informed consent
incorrect
16.
Two-factor authentication
incorrect
17.
Digital certificate
incorrect
18.
Worm
incorrect
19.
Distributed Denial of service
incorrect
20.
Content-filtering software
A.
A model of informed consent that permits a company to collect personal information until the customer specifically requests that the data not be collected.
B.
Controls that restrict unauthorized individuals from gaining access to a company's computer facilities
C.
type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed
D.
software designed to restrict or control the content a reader is authorised to access, especially when utilised to restrict material delivered over the Internet via the Web, e-mail, or other means
E.
An attack that uses deception to fraudulently acquire sensitive personal information by masquerading as an official-looking e-mail
F.
(also called asymmetric encryption) A type of encryption that uses two different keys, a public key and a private key.
G.
Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.
H.
any network within your organization
I.
A process that determines the identity of the person requiring access.
J.
A private combination of characters that only the user should know.
K.
Software packages that attempt to identify and eliminate viruses, worms, and other malicious software.
L.
1. The right of privacy is not absolute. Privacy must be balanced against the needs of society. 2. The public's right to know supersedes the individual's right of privacy.
M.
a sequence of words or other text used to control access to a computer system, program or data
N.
A denial-of-service attack that sends a flood of data packets from many compromised computers simultaneously.
O.
A computer that has been compromised by, and under the control of, a hacker
P.
an application which controls network traffic to and from a computer, permitting or denying communications based on a security policy
Q.
an extra layer of security that is known as "multi factor authentication" that requires not only a password and username but also something that only, and only, that user has on them, i.e. a piece of information only they should know or have immediately t
R.
Malicious software that can attach itself to (or “infect”) other computer programs without the owner of the program being aware of the infection.
S.
An electronic document attached to a file certifying that this file is from the organization it claims to be from and has not been modified from its original format or content.
T.
Tracking people's activities with the aid of computers
Type the Term that corresponds to the displayed Definition.
incorrect
21.
A model of informed consent in which a business is prohibited from collecting any personal information unless the customer specifically authorizes it.
incorrect
22.
A software program containing a hidden function that presents a security risk
incorrect
23.
refers to the list of web pages a user has visited recently—and associated data such as page title and time of visit—
incorrect
24.
Controls that restrict unauthorized individuals from using information resources and are concerned with user identification.
incorrect
25.
software to block connections to inappropriate Web sites
incorrect
26.
Malicious software such as viruses and worms
incorrect
27.
A system (either hardware, software, or a combination of both) that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network.
incorrect
28.
The process of forming a digital dossier (An electronic description of an individual and his or her habits)
incorrect
29.
A process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in a quarantined environment until the company can verify its validity.
incorrect
30.
Getting around security systems by tricking computer users inside a company into revealing sensitive information or gaining unauthorized access privileges

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: willjhg