SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Be at least 8 foot tall and have three strands of barbed wire.
Digital certificates
Qualitative
Fences
CCTV
2. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Fire extinguisher
Data Mart
Software
Salami Slicing
3. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Worm
Granularity
Artificial Neural Networks (ANN)
Burden of Proof
4. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Sniffing
Copyright
Bugtraq
Identification
5. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
DNS cache poisoning
Honey pot
Job rotation
Raid 0 - 1 - 3 - 5
6. The person that determines the permissions to files. The data owner.
Joke
Owner
Copyright
Transposition
7. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
COM
Service packs
Sniffing
Hackers
8. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
Risk Management
Dictionary Attack
l0pht
Block cipher
9. A network that mimics the brain
Trademark
EF (Exposure Factor)
Authorization creep
Artificial Neural Networks (ANN)
10. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Honey pot
Java
Salami Slicing
CEO
11. Continuation of Operations Plan
Script kiddies
COOP
Authorization
Noise & perturbation
12. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
ALE (Annualized Loss Expectancy)
Virtual machine
Biometric profile
Covert channels
13. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Firewall types
Smurf
Finger scanning
Stream cipher
14. Network devices that operate at layer 3. This device separates broadcast domains.
Firmware
Routers
Patriot Act
Authorization creep
15. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Exit interview
Nonce
Penetration testing
WTLS (Wireless Transport Layer Security)
16. Reasonable doubt
Burden of Proof
Risk Analysis
User
Degausser
17. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
SSO (Single sign-on)
Hackers
Finger scanning
Object Oriented Programming
18. Motive - Opportunity - and Means. These deal with crime.
CIRT
Due Care
MOM
Promiscuous mode
19. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Separation of duties
Scanning
Smurf
WTLS (Wireless Transport Layer Security)
20. Someone whose hacking is primarily targeted at the phone systems
EF (Exposure Factor)
Phreaker
Risk Acceptance
Accountability
21. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Compiler
MOM
Hot Site
Software development lifecycle
22. Dynamic Host Configuration Protocol.
EF (Exposure Factor)
Acceptable use
Accreditation
DHCP
23. The act of identifying yourself. Providing your identity to a system
Detective - Preventive - Corrective
Identification
Service packs
Worm
24. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Joke
Expert systems
Passive attacks
VPN (Virtual Private Network)
25. Enticing people to hit your honeypot to see how they try to access your system.
Expert System
Enticement
Stream cipher
Covert channels
26. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
EF (Exposure Factor)
SSO (Single sign-on)
SSH
Eavesdropping
27. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Passive attacks
Carnivore
Covert channels
Mandatory vacation
28. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Switches / Bridges
Fiber optic
Risk Analysis
Debug
29. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Job rotation
Data Mart
Digital signing
Entrapment
30. An instance of a scripting language
Malware
Script
CIA
Checksum
31. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Risk Acceptance
Java
IAB
Skipjack
32. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
TCSEC
Cookies
Hot Site
Hackers
33. A site that has some equipment in place - and can be up within days
RAM (Random-access memory)
Hubs
Warm Site
CD-Rom
34. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Degausser
CORBA
Format 7 times
Authorization creep
35. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Tokens
Patent
Substitution
Asset Value
36. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
PKI
Patent
OEP
Reciprocal agreement
37. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Patriot Act
Aggregation
CIA
Smurf
38. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Username/password
Vulnerability analysis tools
SSO (Single sign-on)
/etc/passwd
39. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
Brute force
OEP
Patent
40. The practice of following someone with a security code or keycard through a security door - generally in workplaces.
Trademark
Change management
Privacy Act of 1974
Tailgating / Piggybacking
41. Random Number Base
Multiprocessing
Symmetric
CEO
Nonce
42. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Due Diligence
Halon
Phreaker
Substitution
43. The frequency with which a threat is expected to occur.
War driving
FAR/FRR/CER
ARO (Annualized Rate of Occurrence)
Acceptable use
44. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Security through obscurity
Classes of IP networks
ARP (Address Resolution Protocol)
Fiber optic
45. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
Carnivore
CIA
CGI (The Common Gateway Interface)
Degausser
46. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
DAD
Security kernel
SESAME
Buffer overflow
47. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
Encryption
RADIUS (Remote authentication dial-in user service)
Session Hijacking
Security Perimeter
48. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Firmware
Finger scanning
Probing
Debug
49. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Separation of duties
Switches / Bridges
Hearsay Evidence
Finger printing
50. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Hackers
Symmetric
Script
Active attacks