SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Risk Acceptance
ROT-13
Change management
Smart cards
2. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Risk Mitigation
Code of ethics
Privacy Act of 1974
War driving
3. Computer Incident Response Team
SLE (Single Loss Expectancy or Exposure)
CIRT
Replay
Burden of Proof
4. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
Dictionary Attack
Polymorphism
Echelon
DDOS
5. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Granularity
Entrapment
SESAME
Bugtraq
6. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Patriot Act
ARP (Address Resolution Protocol)
Keystroke logging
Copyright
7. The art of breaking code. Testing the strength of an algorithm.
Spoofing
CEO
Firewall types
Cryptanalysis
8. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
Session Hijacking
Virtual Memory/Pagefile.sys
TCB
PAP (Password Authentication Protocol)
9. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Callback Security/Call Forwarding
Caesar Cipher
Acceptable use
Closed network
10. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
Finger scanning
Worm
Passive attacks
Motion detector
11. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Certification
Format 7 times
Throughput of a Biometric System
UUEncode
12. The output of a hash function is a digest.
Nonce
Quantitative
Degausser
Digest
13. Also known as a tunnel)
Username/password
VPN (Virtual Private Network)
Hubs
Honey pot
14. Repeats the signal. It amplifies the signal before sending it on.
Schema
Fiber optic
Repeaters
Data Mart
15. Dialing fixed sets telephone numbers looking for open modem connections to machines
CIO
Packet Sniffing
Spoofing
War dialing
16. Software designed to infiltrate or damage a computer system - without the owner's consent.
Malware
WTLS (Wireless Transport Layer Security)
Asymmetric
Enticement
17. A technique to eliminate data redundancy.
Normalization
Cyphertext only
Risk Transferring
Finger scanning
18. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
Callback Security/Call Forwarding
CD-Rom
Raid 0 - 1 - 3 - 5
Format 7 times
19. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
War dialing
Noise & perturbation
Authorization
Dogs
20. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
Fraggle
Polymorphic
Normalization
Compiler
21. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Job rotation
Burden of Proof
Probing
Passive attacks
22. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.
TCB
CHAP
Virtual Memory/Pagefile.sys
Hearsay Evidence
23. Scanning the airwaves for radio transmissions
Scanning
Hackers
PKI
Script
24. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Social engineering
ISDN (Integrated Services Digital Network)
Finger scanning
Trojan horses
25. The real cost of acquiring/maintaining/developing a system
Polymorphic
Active attacks
Asset Value
SSO (Single sign-on)
26. Random Number Base
Caesar Cipher
Senior Management
Nonce
Open network
27. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
FAR/FRR/CER
Clipper Chip
DCOM
Trademark
28. Animals with teeth. Not as discriminate as guards
Guards
Rijndael
Dogs
Masquerade
29. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
CIRT
Authorization
Finger scanning
Acceptable use
30. A network that uses standard protocols (TCP/IP)
Trademark
Open network
Tokens
Embezzlement
31. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Privacy Act of 1974
Hardware
Brute force
Dogs
32. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Tort
Coax
Echelon
Object Oriented Programming
33. An attempt to trick the system into believing that something false is real
Hoax
Switches / Bridges
Symmetric
Eavesdropping
34. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Reciprocal agreement
Hearsay Evidence
WAP (Wireless Application Protocol)
Key Escrow
35. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Change management
Security through obscurity
Debug
Encryption
36. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
Multitasking
Service packs
Polymorphism
Nonce
37. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
DOS
Authorization
Owner
Fire extinguisher
38. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Out of band
Common criteria
Quantitative
Attenuation
39. Dynamic Host Configuration Protocol.
Keystroke logging
/etc/passwd
Malware
DHCP
40. Enticing people to hit your honeypot to see how they try to access your system.
/etc/passwd
Masquerade
Risk Mitigation
Enticement
41. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
DDOS
Trademark
Dogs
Data remanence
42. The frequency with which a threat is expected to occur.
ROT-13
Finger scanning
Trademark
ARO (Annualized Rate of Occurrence)
43. The person that controls access to the data
Custodian
Malware
Cryptanalysis
Active attacks
44. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
Keystroke logging
Carnivore
Owner
Script kiddies
45. Once authenticated - the level of access you have to a system
SESAME
Authorization
Risk Management
Quality Assurance
46. Involving the measurement of quantity or amount.
Hacker
Quantitative
Non-repudiation
Compiler
47. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Certification
Reciprocal agreement
ActiveX Object Linking and Embedding
Security Awareness Training
48. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
OSI Model
DMZ
TCSEC
ActiveX Object Linking and Embedding
49. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Closed network
Symmetric
Centralized
Mandatory vacation
50. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
ROT-13
Substitution
Debug
Expert systems
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests