SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
BIA
Dumpster diving
Format 7 times
Symmetric
2. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
CORBA
Security Perimeter
Macro
Authentication
3. Emanations from one wire coupling with another wire
IAB
Crosstalk
Eavesdropping
PKI
4. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
Callback Security/Call Forwarding
Firewall types
RADIUS (Remote authentication dial-in user service)
Passive attacks
5. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Clipper Chip
Skipjack
Service packs
Authorization creep
6. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Biometric profile
MitM
CEO
Classes of IP networks
7. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
WTLS (Wireless Transport Layer Security)
Boot-sector Virus
Cryptanalysis
TEMPEST
8. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Salami Slicing
Smart cards
Brute force
Brute Force
9. Continuation of Operations Plan
Dumpster diving
Dictionary Attack
COOP
OEP
10. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
TCSEC
Symmetric
SSL/TLS
TEMPEST
11. Scanning the airwaves for radio transmissions
Due Care
Script
Scanning
EF (Exposure Factor)
12. 'If you cant see it - its secure'. Bad policy to live by.
l0pht
RADIUS (Remote authentication dial-in user service)
Security through obscurity
Digital signing
13. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Reciprocal agreement
SLE (Single Loss Expectancy or Exposure)
Incentive programs
Boot-sector Virus
14. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Detective - Preventive - Corrective
Exit interview
TCSEC
IRC
15. Must be in place for you to use a biometric system
Fences
Termination procedures
Biometric profile
SESAME
16. The art of breaking code. Testing the strength of an algorithm.
Degausser
Trademark
Cryptanalysis
Script kiddies
17. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Polymorphic
Change management
Nonce
Quantitative
18. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Rijndael
Fire extinguisher
Guards
Software librarian
19. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Checksum
Inference
Tort
Hubs
20. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
Digital certificates
SSL/TLS
OSI Model
Finger scanning
21. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Security Awareness Training
OEP
Cryptanalysis
Expert systems
22. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
DHCP
Kerberos
Sniffing
Username/password
23. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Tokens
War dialing
Quantitative
PAP (Password Authentication Protocol)
24. Providing verification to a system
ARP (Address Resolution Protocol)
Authentication
ALE (Annualized Loss Expectancy)
SSL/TLS
25. Chief Executive Officer
Expert systems
CHAP
CEO
SYN Flood
26. An instance of a scripting language
Script
Logic bomb
Java
Common criteria
27. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Polymorphic
Symmetric
Firewall types
Block cipher
28. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Security kernel
Hackers
Birthday attack
Incentive programs
29. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Motion detector
Data remanence
Classes of IP networks
Digest
30. More discriminate than dogs
Acceptable use
Cyphertext only
Guards
Encryption
31. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
CD-Rom
Quantitative
Substitution
Crosstalk
32. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
Crosstalk
CHAP
Probing
CD-Rom
33. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Reciprocal agreement
ALE (Annualized Loss Expectancy)
Artificial Neural Networks (ANN)
Dumpster diving
34. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Nonce
VLANs
Classes of IP networks
SSL/TLS
35. Good for distance - longer than 100M
Technical - Administrative - Physical
Audit Trail
Coax
Multitasking
36. Relating to quality or kind. This assigns a level of importance to something.
Expert System
CHAP
CORBA
Qualitative
37. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Hot Site
Patriot Act
Finger scanning
CIA
38. A system designed to stop piggybacking.
Hearsay Evidence
Man trap
SLE (Single Loss Expectancy or Exposure)
Toneloc
39. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
MitM
TEMPEST
Firmware
Dumpster diving
40. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Separation of duties
Checksum
Hash
Callback Security/Call Forwarding
41. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Normalization
Digital certificates
Passive attacks
ROM (Read-only memory)
42. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
CEO
Brewer-Nash model
Routers
Clipping levels
43. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
AES (Advanced Encryption Standard)
Risk Mitigation
Authentication
l0pht
44. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Biometrics
Username/password
VPN (Virtual Private Network)
CIO
45. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Owner
DNS cache poisoning
Cryptanalysis
Script kiddies
46. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Call tree
Probing
Passive attacks
Noise & perturbation
47. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
ISDN (Integrated Services Digital Network)
Polymorphism
Hubs
RAM (Random-access memory)
48. A network that mimics the brain
Vulnerability analysis tools
Social engineering
Artificial Neural Networks (ANN)
CGI (The Common Gateway Interface)
49. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Encryption
Data Mart
Copyright
Degausser
50. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Encryption
CIRT
Reciprocal agreement
DDOS