SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Block cipher
Smart cards
War driving
Encryption
2. White hat l0pht
CCTV
Joke
Bugtraq
Detective - Preventive - Corrective
3. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Separation of duties
PKI
Switches / Bridges
Finger scanning
4. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
ROM (Read-only memory)
SSL/TLS
Brute Force
Sniffing
5. Refers to the formal acceptance by organization executive management that they accept the residual risk associated with using a formally certified information system.
SESAME
Termination procedures
SLE (Single Loss Expectancy or Exposure)
Accreditation
6. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Coax
Out of band
Birthday attack
CIRT
7. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Echelon
Digital signing
Bugtraq
Due Care
8. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Rijndael
SSH
Guards
Brewer-Nash model
9. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Fire extinguisher
Rijndael
Substitution
Virtual machine
10. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Degausser
Hubs
Service packs
Hackers
11. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Logic bomb
Transposition
Penetration testing
Base-64
12. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Brute force
Salami Slicing
OLE
RADIUS (Remote authentication dial-in user service)
13. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
OLE
Asset Value
Data Mart
Format 7 times
14. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Well-known ports
COOP
Block cipher
SESAME
15. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Security kernel
Throughput of a Biometric System
Common criteria
Script
16. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Dumpster diving
SQL (Structured Query Language)
Passive attacks
PAP (Password Authentication Protocol)
17. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s
Diffie-Hellman
Clipper Chip
Logic bomb
Trade Secret
18. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Dogs
DCOM
Separation of duties
War dialing
19. A technique to eliminate data redundancy.
Normalization
Macro
ROT-13
Masquerade
20. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
Masquerade
Security kernel
Burden of Proof
Replay
21. Same as a block cipher except that it is applied to a data stream one bit at a time
SLE (Single Loss Expectancy or Exposure)
Exit interview
Stream cipher
Private Addressing
22. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Firewall types
MitM
Dogs
SSH
23. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Tort
Joke
Compiler
Privacy Act of 1974
24. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Penetration testing
Tokens
WTLS (Wireless Transport Layer Security)
Authentication
25. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Detective - Preventive - Corrective
Patent
Security through obscurity
Certification
26. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
DHCP
Brute Force
Tort
Smurf
27. Relating to quality or kind. This assigns a level of importance to something.
Qualitative
War driving
COOP
Fiber optic
28. Access control method for database based on the content of the database to provide granular access
Content dependant
Exit interview
Risk Mitigation
SQL (Structured Query Language)
29. When security is managed at many different points in an organization
Embezzlement
Trade Secret
Decentralized
Artificial Neural Networks (ANN)
30. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Username/password
Sniffing
Skipjack
COOP
31. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
CEO
Boot-sector Virus
Worm
Halon
32. Transferring your risk to someone else - typically an insurance company
Risk Transferring
Burden of Proof
WAP (Wireless Application Protocol)
Crosstalk
33. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
Call tree
IRC
Dogs
CD-Rom
34. The person that determines the permissions to files. The data owner.
Owner
Aggregation
Multipartite
Separation of duties
35. The person that controls access to the data
UUEncode
Encryption
Motion detector
Custodian
36. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
ROM (Read-only memory)
Promiscuous mode
ALE (Annualized Loss Expectancy)
Buffer overflow
37. These can be used to verify that public keys belong to certain individuals.
VLANs
Digital certificates
ROT-13
Acceptable use
38. Computer Incident Response Team
Authorization
CIRT
TCSEC
Back door/ trap door/maintenance hook
39. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Clipper Chip
Owner
Buffer overflow
SQL (Structured Query Language)
40. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Motion detector
Tailgating / Piggybacking
Object Oriented Programming
Centralized
41. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
CEO
Entrapment
Joke
Worm
42. Once authenticated - the level of access you have to a system
Granularity
Detective - Preventive - Corrective
PAP (Password Authentication Protocol)
Authorization
43. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Granularity
Nonce
DNS cache poisoning
Echelon
44. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Cyphertext only
Object Oriented Programming
Acceptable use
Covert channels
45. This is an open international standard for applications that use wireless communications.
Social engineering
WAP (Wireless Application Protocol)
Birthday attack
Crosstalk
46. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Virtual Memory/Pagefile.sys
CIA
Clipping levels
Aggregation
47. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
ROT-13
DCOM
Clipping levels
Tokens
48. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Granularity
Format 7 times
Multitasking
Security Perimeter
49. The art of breaking code. Testing the strength of an algorithm.
Cryptanalysis
OSI Model
TCSEC
Well-known ports
50. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Exit interview
Keystroke logging
Debug
Multitasking
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests