SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ability to have more than one thread associated with a process
Virtual machine
CRC (Cyclic Redundancy Check)
TACACS (Terminal access controller access control system)
Multithreading
2. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s
Security through obscurity
MOM
Diffie-Hellman
AES (Advanced Encryption Standard)
3. A sandbox. Emulates an operating environment.
Carnivore
Burden of Proof
Audit Trail
Virtual machine
4. When security is managed at many different points in an organization
RADIUS (Remote authentication dial-in user service)
Diffie-Hellman
Acceptable use
Decentralized
5. Software designed to infiltrate or damage a computer system - without the owner's consent.
Replay
Certification
Malware
Digital certificates
6. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
CHAP
RAM (Random-access memory)
Private Addressing
Script kiddies
7. Basic Input/Output System
Service packs
Encryption
Identification
BIOS
8. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Probing
Coax
Trade Secret
Non-repudiation
9. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
CGI (The Common Gateway Interface)
Clipper Chip
TCSEC
Joke
10. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
DNS cache poisoning
Covert channels
Authorization creep
EF (Exposure Factor)
11. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Caesar Cipher
Session Hijacking
Detective - Preventive - Corrective
OLE
12. Public Key Infrastructure
Copyright
Change management
PKI
Risk Acceptance
13. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Risk Transferring
Authorization creep
Stream cipher
ALE (Annualized Loss Expectancy)
14. Someone who hacks
Hacker
Expert systems
Replay
Repeaters
15. When two or more processes are linked and execute multiple programs simultaneously
Multiprocessing
Data remanence
Caesar Cipher
Technical - Administrative - Physical
16. Same as a block cipher except that it is applied to a data stream one bit at a time
Smurf
Security Perimeter
Raid 0 - 1 - 3 - 5
Stream cipher
17. The art of breaking code. Testing the strength of an algorithm.
WTLS (Wireless Transport Layer Security)
Cryptanalysis
Spoofing
Hardware
18. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
CIRT
Hoax
Exit interview
Fire extinguisher
19. Relating to quality or kind. This assigns a level of importance to something.
Warm Site
Qualitative
Kerberos
Rolling hot sites
20. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Clipper Chip
Common criteria
Callback Security/Call Forwarding
Encryption
21. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
ROM (Read-only memory)
Reciprocal agreement
CCTV
Digital signing
22. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Termination procedures
Technical - Administrative - Physical
Script kiddies
Hubs
23. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Format 7 times
Man trap
Honey pot
SYN Flood
24. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Penetration testing
Cookies
Multithreading
Rijndael
25. The person that controls access to the data
Custodian
DOS
Callback Security/Call Forwarding
Smurf
26. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Mandatory vacation
Encryption
Malware
NAT
27. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
CGI (The Common Gateway Interface)
Clipper Chip
EF (Exposure Factor)
Switches / Bridges
28. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Audit Trail
Embezzlement
Private Addressing
Hoax
29. Component Object Model.
Routers
Software
COM
Fraud
30. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
Risk Management
Replay
WAP (Wireless Application Protocol)
Caesar Cipher
31. Must be in place for you to use a biometric system
Biometric profile
WAP (Wireless Application Protocol)
Carnivore
Block cipher
32. This is an open international standard for applications that use wireless communications.
Accreditation
Substitution
WAP (Wireless Application Protocol)
Common criteria
33. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
OSI Model
Tokens
Mandatory vacation
Joke
34. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
CEO
Noise & perturbation
Joke
Cookies
35. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Penetration testing
WTLS (Wireless Transport Layer Security)
WAP (Wireless Application Protocol)
Hot Site
36. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Private Addressing
Compiler
Bugtraq
Sabotage
37. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Embezzlement
MOM
CORBA
Hash
38. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Security Awareness Training
Echelon
Bugtraq
Checksum
39. Continuation of Operations Plan
COOP
Asymmetric
Passive attacks
IAB
40. A network entity that provides a single entrance / exit point to the Internet.
Scanning
Motion detector
Active attacks
Bastion hosts
41. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
DMZ
Authentication
Hardware
SSL/TLS
42. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
WAP (Wireless Application Protocol)
Motion detector
Boot-sector Virus
Termination procedures
43. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Tort
Sabotage
Risk Acceptance
Common criteria
44. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
SSL/TLS
Cookies
CGI (The Common Gateway Interface)
Two-Factor Authentication
45. A RFC standard. A mechanism for performing commands on a remote system
DAD
Cold Site
Telnet
Hubs
46. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
Expert System
Object Oriented Programming
SSO (Single sign-on)
ISDN (Integrated Services Digital Network)
47. Dialing fixed sets telephone numbers looking for open modem connections to machines
Username/password
War dialing
Hash
ALE (Annualized Loss Expectancy)
48. Internet Architecture Board. This board is responsible for protecting the Internet.
IAB
Session Hijacking
Polymorphism
Classes of IP networks
49. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Back door/ trap door/maintenance hook
Non-repudiation
Brewer-Nash model
Patriot Act
50. Method of authenticating to a system. Something that you supply and something you know.
Digest
Coax
Expert System
Username/password
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests