SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Random Number Base
Senior Management
DNS cache poisoning
Nonce
Username/password
2. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
TACACS (Terminal access controller access control system)
Degausser
Worm
Buffer overflow
3. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
CIRT
Custodian
OSI Model
Change management
4. A network that uses standard protocols (TCP/IP)
Routers
Open network
VPN (Virtual Private Network)
Attenuation
5. Motive - Opportunity - and Means. These deal with crime.
Firmware
SESAME
Nonce
MOM
6. Common Object Request Broker Architecture.
Code of ethics
Change management
Owner
CORBA
7. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Authorization
Brute force
Brewer-Nash model
Polymorphic
8. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Diffie-Hellman
Object Oriented Programming
Digest
Vulnerability analysis tools
9. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Block cipher
Crosstalk
Bastion hosts
ALE (Annualized Loss Expectancy)
10. Component Object Model.
Macro
Guards
Salami Slicing
COM
11. Relating to quality or kind. This assigns a level of importance to something.
Noise & perturbation
Qualitative
Expert systems
CD-Rom
12. A technique to eliminate data redundancy.
VLANs
Normalization
Clipper Chip
DMZ
13. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
SSL/TLS
Bugtraq
Noise & perturbation
BIOS
14. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Script
Classes of IP networks
Penetration testing
Polymorphic
15. Threat to physical security.
Symmetric
Fiber optic
Attenuation
Sabotage
16. Repeats the signal. It amplifies the signal before sending it on.
Accountability
Service packs
Repeaters
Keystroke logging
17. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Code of ethics
Dictionary Attack
Private Addressing
Coax
18. When two or more processes are linked and execute multiple programs simultaneously
Open network
Multiprocessing
Honey pot
Firmware
19. Chief Executive Officer
Quantitative
CEO
Trademark
SSL/TLS
20. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s
OLE
Wiretapping
Substitution
Diffie-Hellman
21. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
SQL (Structured Query Language)
Private Addressing
DHCP
Authorization creep
22. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Risk Management
DDOS
Trojan horses
War dialing
23. Animals with teeth. Not as discriminate as guards
Eavesdropping
Dogs
Granularity
Risk Transferring
24. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Exit interview
Dogs
ARO (Annualized Rate of Occurrence)
Object Oriented Programming
25. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
Fraud
CD-Rom
Accreditation
BIOS
26. A network that uses proprietary protocols
Honey pot
Closed network
Salami Slicing
COOP
27. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Security kernel
Fire extinguisher
SSL/TLS
CD-Rom
28. Involving the measurement of quantity or amount.
Throughput of a Biometric System
Quantitative
Expert systems
SLE (Single Loss Expectancy or Exposure)
29. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
FAR/FRR/CER
Sniffing
RADIUS (Remote authentication dial-in user service)
Coax
30. A mechanism by which connections to TCP services on a system are allowed or disallowed
Repeaters
Technical - Administrative - Physical
TCP Wrappers
Reciprocal agreement
31. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Multipartite
TCP Wrappers
Detective - Preventive - Corrective
Crosstalk
32. A military standard defining controls for emanation protection
Sniffing
Hardware
TEMPEST
CRC (Cyclic Redundancy Check)
33. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Custodian
Halon
Fire extinguisher
Symmetric
34. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Compiler
RADIUS (Remote authentication dial-in user service)
Logic bomb
TCSEC
35. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Skipjack
Privacy Act of 1974
Reciprocal agreement
Decentralized
36. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Kerberos
Cookies
Well-known ports
Patriot Act
37. Someone who hacks
Hacker
Key Escrow
Software
Patriot Act
38. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Substitution
IAB
Fiber optic
CIRT
39. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
ActiveX Object Linking and Embedding
Authentication
Salami Slicing
SSH
40. A network that mimics the brain
BIA
FAR/FRR/CER
Artificial Neural Networks (ANN)
Logic bomb
41. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Normalization
Privacy Act of 1974
Hackers
Warm Site
42. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
ARP (Address Resolution Protocol)
Virtual Memory/Pagefile.sys
Degausser
Accountability
43. 'If you cant see it - its secure'. Bad policy to live by.
UUEncode
Active attacks
Security through obscurity
Tort
44. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
CEO
Spoofing
OLE
Quantitative
45. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Normalization
Penetration testing
Data Mart
Polymorphism
46. The person that controls access to the data
Custodian
Owner
Probing
Noise & perturbation
47. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Cyphertext only
Brute force
Twisted pair
Content dependant
48. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
CRC (Cyclic Redundancy Check)
MOM
Aggregation
Termination procedures
49. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
SQL (Structured Query Language)
CGI (The Common Gateway Interface)
Logic bomb
TCP Wrappers
50. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
Patriot Act
CEO
WTLS (Wireless Transport Layer Security)
Out of band
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests