SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Custodian
Active attacks
CD-Rom
Rijndael
2. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Authentication
SLE (Single Loss Expectancy or Exposure)
Spoofing
/etc/passwd
3. Software designed to infiltrate or damage a computer system - without the owner's consent.
Hardware
Malware
Polymorphic
Granularity
4. Same as a block cipher except that it is applied to a data stream one bit at a time
Multitasking
Authorization creep
Stream cipher
Polymorphism
5. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Motion detector
Audit Trail
Raid 0 - 1 - 3 - 5
Technical - Administrative - Physical
6. Internet Architecture Board. This board is responsible for protecting the Internet.
Caesar Cipher
IAB
Trap Door
Closed network
7. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Switches / Bridges
Substitution
Enticement
Burden of Proof
8. White hat l0pht
COOP
Bugtraq
Back door/ trap door/maintenance hook
Bastion hosts
9. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Toneloc
Separation of duties
Firmware
CIO
10. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Enticement
Normalization
DDOS
Finger scanning
11. The practice of obtaining confidential information by manipulation of legitimate users.
CHAP
Dogs
Social engineering
Script
12. Repeats the signal. It amplifies the signal before sending it on.
Repeaters
Joke
Software development lifecycle
RAM (Random-access memory)
13. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Brute force
Base-64
Man trap
Rolling hot sites
14. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Digest
Multitasking
COM
Finger printing
15. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
Identification
CHAP
Spoofing
Acceptable use
16. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Security Perimeter
Multipartite
Trade Secret
Attenuation
17. 'If you cant see it - its secure'. Bad policy to live by.
Twisted pair
DOS
Security through obscurity
ROM (Read-only memory)
18. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Artificial Neural Networks (ANN)
Out of band
Hearsay Evidence
Schema
19. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Patent
Tailgating / Piggybacking
Session Hijacking
Logic bomb
20. A site that is ready physically but has no hardware in place - all it has is HVAC
Cryptanalysis
Service packs
TCSEC
Cold Site
21. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
Fences
TACACS (Terminal access controller access control system)
SLE (Single Loss Expectancy or Exposure)
Warm Site
22. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Digital signing
DHCP
Stream cipher
Attenuation
23. Chief Executive Officer
ALE (Annualized Loss Expectancy)
Brewer-Nash model
CEO
Salami Slicing
24. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Accountability
Rijndael
Format 7 times
Debug
25. Disclosure - Alteration - Destruction. These things break the CIA triad
MitM
Due Diligence
Repeaters
DAD
26. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
Accountability
Motion detector
Security Perimeter
Carnivore
27. Component Object Model.
Security kernel
COM
Decentralized
VPN (Virtual Private Network)
28. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Software development lifecycle
Expert systems
Multithreading
Polymorphism
29. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Firmware
Virtual machine
Dictionary Attack
SQL (Structured Query Language)
30. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Eavesdropping
Rolling hot sites
ROM (Read-only memory)
Entrapment
31. Continuation of Operations Plan
COOP
Active attacks
Degausser
Cookies
32. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Security kernel
Embezzlement
Expert systems
Script kiddies
33. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Two-Factor Authentication
Echelon
Sniffing
COM
34. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Service packs
Virtual machine
Diffie-Hellman
Buffer overflow
35. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Skipjack
SSL/TLS
DMZ
EF (Exposure Factor)
36. Network Address Translation
Masquerade
Substitution
CD-Rom
NAT
37. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
ARO (Annualized Rate of Occurrence)
Firmware
Polymorphic
RADIUS (Remote authentication dial-in user service)
38. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
UUEncode
Decentralized
Motion detector
Clipper Chip
39. Accepting all packets
Firewall types
Biometric profile
Promiscuous mode
Worm
40. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Detective - Preventive - Corrective
Worm
Penetration testing
Well-known ports
41. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Tort
Fraud
War driving
CORBA
42. A military standard defining controls for emanation protection
SSL/TLS
TEMPEST
ARP (Address Resolution Protocol)
Exit interview
43. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
DHCP
Software librarian
Encryption
Copyright
44. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Well-known ports
Normalization
Social engineering
Multitasking
45. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Finger printing
Raid 0 - 1 - 3 - 5
Brute Force
Qualitative
46. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Warm Site
Honey pot
Granularity
CHAP
47. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Repeaters
Security Awareness Training
Hash
VLANs
48. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Certification
Termination procedures
CEO
Software librarian
49. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Brute Force
Motion detector
Classes of IP networks
Scanning
50. Someone who hacks
Hacker
CIO
Clipping levels
Birthday attack