SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Trap Door
Twisted pair
OSI Model
BIOS
2. When security is managed at a central point in an organization
IRC
Centralized
Authorization
Expert systems
3. Same as a block cipher except that it is applied to a data stream one bit at a time
Polymorphism
IAB
Stream cipher
Change management
4. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Base-64
Kerberos
Sniffing
Finger scanning
5. Dynamic Host Configuration Protocol.
Security kernel
DHCP
CGI (The Common Gateway Interface)
Expert System
6. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
Decentralized
Closed network
Raid 0 - 1 - 3 - 5
CHAP
7. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Granularity
Compiler
Owner
Hacker
8. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
Hardware
Asset Value
SSH
Bugtraq
9. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
CEO
Echelon
Multiprocessing
Software
10. In the broadest sense - a fraud is a deception made for personal gain
Fraud
Artificial Neural Networks (ANN)
OLE
Certification
11. Basic Input/Output System
BIOS
Accreditation
Patent
Salami Slicing
12. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Multipartite
Quality Assurance
Logic bomb
Fraggle
13. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Object Oriented Programming
Hacker
Two-Factor Authentication
Call tree
14. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
OSI Model
Firewall types
Audit Trail
Senior Management
15. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Polymorphic
Hot Site
Scanning
Checksum
16. Repeats the signal. It amplifies the signal before sending it on.
Repeaters
Common criteria
Enticement
Quality Assurance
17. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
SSO (Single sign-on)
Boot-sector Virus
Polymorphic
CIO
18. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Mandatory vacation
Hackers
Java
DDOS
19. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
ALE (Annualized Loss Expectancy)
Teardrop
CRC (Cyclic Redundancy Check)
Acceptable use
20. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Classes of IP networks
Cookies
BIA
Honey pot
21. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
OSI Model
PAP (Password Authentication Protocol)
Object Oriented Programming
Accountability
22. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Security Awareness Training
Authorization
Tailgating / Piggybacking
Sniffing
23. Closed Circuit Television
Finger scanning
DCOM
Trade Secret
CCTV
24. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Warm Site
Keystroke logging
Copyright
Dumpster diving
25. This is an open international standard for applications that use wireless communications.
Macro
WAP (Wireless Application Protocol)
Debug
Mandatory vacation
26. A technique to eliminate data redundancy.
Bugtraq
Normalization
Finger printing
Username/password
27. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
War driving
Echelon
Teardrop
Social engineering
28. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Aggregation
Fire extinguisher
Inference
Risk Acceptance
29. Method of authenticating to a system. Something that you supply and something you know.
War dialing
DAD
Telnet
Username/password
30. In a separation of duties model - this is where code is checked in and out
Man trap
Software librarian
Risk Analysis
Senior Management
31. The ability to have more than one thread associated with a process
BIA
ALE (Annualized Loss Expectancy)
Scanning
Multithreading
32. White hat l0pht
Bugtraq
Object Oriented Programming
Hash
DHCP
33. Network devices that operate at layer 3. This device separates broadcast domains.
Routers
Expert systems
Guards
Tort
34. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
BIOS
SSH
CD-Rom
Security Perimeter
35. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Base-64
Security kernel
WAP (Wireless Application Protocol)
Man trap
36. A network that uses standard protocols (TCP/IP)
Open network
Halon
Nonce
Biometric profile
37. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
SSO (Single sign-on)
Routers
Trademark
Symmetric
38. Object Linking and Embedding. The ability of an object to be embedded into another object.
Echelon
Cookies
Due Care
OLE
39. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
Mandatory vacation
EF (Exposure Factor)
Bastion hosts
Qualitative
40. A gas used in fire suppression. Not human safe. Chemical reaction.
Clipper Chip
Identification
Halon
Coax
41. Personal - Network - and Application
Brute Force
Smart cards
Normalization
Firewall types
42. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
CCTV
Authorization
/etc/passwd
Schema
43. Jumping into dumpsters to retrieve information about someone/something/a company
Dumpster diving
FAR/FRR/CER
Compiler
Hoax
44. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Bugtraq
Buffer overflow
Polymorphic
Security through obscurity
45. A network entity that provides a single entrance / exit point to the Internet.
Biometric profile
Bastion hosts
Accountability
Two-Factor Authentication
46. Good for distance - longer than 100M
Inference
Coax
Key Escrow
Macro
47. Component Object Model.
Honey pot
COM
Halon
Hardware
48. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
User
Risk Management
Due Diligence
Fences
49. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Encryption
Software development lifecycle
Quality Assurance
Carnivore
50. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
FAR/FRR/CER
DAD
Trademark
Open network