SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Patriot Act
Hackers
VLANs
Nonce
2. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Scanning
Dictionary Attack
Open network
Honey pot
3. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
User
Format 7 times
PAP (Password Authentication Protocol)
Packet Sniffing
4. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Technical - Administrative - Physical
MOM
Classes of IP networks
Passive attacks
5. Accepting all packets
Promiscuous mode
Classes of IP networks
Owner
Security kernel
6. Common Object Request Broker Architecture.
ROT-13
CORBA
Back door/ trap door/maintenance hook
Warm Site
7. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Packet Sniffing
Job rotation
Well-known ports
Base-64
8. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Noise & perturbation
Hackers
SQL (Structured Query Language)
SSO (Single sign-on)
9. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Bugtraq
ActiveX Object Linking and Embedding
Trojan horses
Masquerade
10. Transferring your risk to someone else - typically an insurance company
DMZ
Risk Transferring
Hardware
Call tree
11. Must be in place for you to use a biometric system
Separation of duties
SSO (Single sign-on)
Biometric profile
Salami Slicing
12. When two or more processes are linked and execute multiple programs simultaneously
Spoofing
Risk Mitigation
Due Diligence
Multiprocessing
13. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
OSI Model
Trojan horses
Rijndael
VLANs
14. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Patent
Trap Door
Detective - Preventive - Corrective
Dogs
15. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Burden of Proof
Script kiddies
Session Hijacking
Smurf
16. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Skipjack
Hearsay Evidence
Multipartite
Embezzlement
17. Chief Executive Officer
Attenuation
NAT
CEO
Patent
18. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Polymorphic
CIO
Noise & perturbation
Service packs
19. 'If you cant see it - its secure'. Bad policy to live by.
Security through obscurity
Identification
Base-64
Packet Sniffing
20. Disclosure - Alteration - Destruction. These things break the CIA triad
AES (Advanced Encryption Standard)
DAD
RADIUS (Remote authentication dial-in user service)
TCB
21. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
CORBA
Salami Slicing
Clipping levels
OSI Model
22. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
RADIUS (Remote authentication dial-in user service)
Macro
Burden of Proof
Joke
23. Computer Incident Response Team
ActiveX Object Linking and Embedding
CIRT
Warm Site
Authorization creep
24. A sandbox. Emulates an operating environment.
Virtual machine
Reciprocal agreement
Software development lifecycle
Tokens
25. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Code of ethics
Hardware
Brewer-Nash model
CD-Rom
26. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Hacker
Polymorphism
Transposition
Owner
27. Threat to physical security.
Sabotage
Trademark
Throughput of a Biometric System
Fences
28. A network entity that provides a single entrance / exit point to the Internet.
Bastion hosts
Object Oriented Programming
Hubs
Granularity
29. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Object Oriented Programming
Skipjack
Aggregation
Virtual machine
30. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Security Awareness Training
DOS
Software development lifecycle
ALE (Annualized Loss Expectancy)
31. Also known as a tunnel)
WAP (Wireless Application Protocol)
Owner
VPN (Virtual Private Network)
Base-64
32. These can be used to verify that public keys belong to certain individuals.
Multitasking
WTLS (Wireless Transport Layer Security)
Digital certificates
Authorization
33. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
Throughput of a Biometric System
Callback Security/Call Forwarding
Polymorphism
BIA
34. Rolling command center with UPS - satellite - uplink - power - etc.
Rolling hot sites
Fences
Tort
Debug
35. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
OSI Model
Dogs
Rolling hot sites
Substitution
36. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Copyright
Asymmetric
Finger printing
SYN Flood
37. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Open network
Closed network
l0pht
Degausser
38. Object Linking and Embedding. The ability of an object to be embedded into another object.
l0pht
Firmware
Due Care
OLE
39. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Termination procedures
Qualitative
ARO (Annualized Rate of Occurrence)
DCOM
40. Distributed Component Object Model. Microsoft's implementation of CORBA.
DCOM
Buffer overflow
Block cipher
Script
41. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Stream cipher
Debug
Detective - Preventive - Corrective
Birthday attack
42. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
OLE
Brute force
Exit interview
Wiretapping
43. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
ROM (Read-only memory)
Risk Analysis
Senior Management
Exit interview
44. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Reciprocal agreement
Service packs
CEO
Private Addressing
45. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Due Diligence
MOM
Nonce
ROM (Read-only memory)
46. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Hubs
NAT
Finger printing
Expert System
47. Internet Architecture Board. This board is responsible for protecting the Internet.
Data Mart
IAB
Authentication
DCOM
48. Same as a block cipher except that it is applied to a data stream one bit at a time
Stream cipher
Non-repudiation
Normalization
AES (Advanced Encryption Standard)
49. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Asset Value
Virtual machine
Smurf
Security through obscurity
50. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Risk Transferring
Replay
Centralized
Change management
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests