SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Stream cipher
Bastion hosts
Clipping levels
Authentication
2. A site that is ready physically but has no hardware in place - all it has is HVAC
Rolling hot sites
Accountability
Cold Site
Qualitative
3. When two or more processes are linked and execute multiple programs simultaneously
Multiprocessing
Artificial Neural Networks (ANN)
Non-repudiation
Hearsay Evidence
4. Defines the objects and their attributes that exist in a database.
Tort
CIO
Schema
Teardrop
5. Public Key Infrastructure
TEMPEST
PKI
Script kiddies
Cryptanalysis
6. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
SSL/TLS
ALE (Annualized Loss Expectancy)
Two-Factor Authentication
TEMPEST
7. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
TCP Wrappers
Separation of duties
Classes of IP networks
Encryption
8. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Brute Force
Buffer overflow
/etc/passwd
Digest
9. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
Fraud
WTLS (Wireless Transport Layer Security)
Dogs
AES (Advanced Encryption Standard)
10. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
MitM
CD-Rom
Format 7 times
Vulnerability analysis tools
11. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
ISDN (Integrated Services Digital Network)
Well-known ports
ROM (Read-only memory)
Tokens
12. A card that holds information that must be authenticated to before it can reveal the information that it is holding
CIA
Smart cards
Authorization creep
SSH
13. Also civil law
Tort
Dogs
Hubs
Macro
14. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
Promiscuous mode
Carnivore
Switches / Bridges
ARP (Address Resolution Protocol)
15. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Audit Trail
IRC
Exit interview
Private Addressing
16. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
DMZ
Encryption
Trojan horses
Multithreading
17. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
SYN Flood
RAM (Random-access memory)
Hearsay Evidence
SSH
18. Dynamic Host Configuration Protocol.
Stream cipher
OEP
PKI
DHCP
19. 'If you cant see it - its secure'. Bad policy to live by.
MitM
Security through obscurity
ISDN (Integrated Services Digital Network)
Attenuation
20. Distributed Component Object Model. Microsoft's implementation of CORBA.
CHAP
DCOM
Promiscuous mode
Joke
21. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Detective - Preventive - Corrective
Decentralized
UUEncode
Penetration testing
22. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
UUEncode
FAR/FRR/CER
Base-64
Boot-sector Virus
23. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Hearsay Evidence
Format 7 times
Tokens
Passive attacks
24. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Mandatory vacation
Passive attacks
Fraggle
Attenuation
25. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Job rotation
Teardrop
Risk Mitigation
Multiprocessing
26. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Virtual Memory/Pagefile.sys
Multithreading
Honey pot
CGI (The Common Gateway Interface)
27. The user
Exit interview
Audit Trail
War driving
User
28. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Cold Site
DDOS
Rolling hot sites
Exit interview
29. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Fences
Acceptable use
Nonce
AES (Advanced Encryption Standard)
30. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Software development lifecycle
Repeaters
CRC (Cyclic Redundancy Check)
Passive attacks
31. Internet Architecture Board. This board is responsible for protecting the Internet.
Covert channels
Diffie-Hellman
IAB
PKI
32. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Illegal/Unethical
DMZ
Caesar Cipher
Termination procedures
33. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Artificial Neural Networks (ANN)
Spoofing
Mandatory vacation
OSI Model
34. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Security Awareness Training
Authorization creep
Virtual Memory/Pagefile.sys
Echelon
35. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
CIA
Rijndael
Fiber optic
Clipping levels
36. Involving the measurement of quantity or amount.
IRC
MOM
Switches / Bridges
Quantitative
37. Jumping into dumpsters to retrieve information about someone/something/a company
Dumpster diving
MOM
Skipjack
Granularity
38. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Active attacks
Passive attacks
Accreditation
MOM
39. Rolling command center with UPS - satellite - uplink - power - etc.
Hacker
CIRT
Aggregation
Rolling hot sites
40. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
SSH
Vulnerability analysis tools
Java
Man trap
41. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
Diffie-Hellman
ARP (Address Resolution Protocol)
IRC
ROM (Read-only memory)
42. The practice of following someone with a security code or keycard through a security door - generally in workplaces.
Hash
Stream cipher
Inference
Tailgating / Piggybacking
43. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Cryptanalysis
Cold Site
Inference
Caesar Cipher
44. Repeats the signal. It amplifies the signal before sending it on.
Smurf
Repeaters
Joke
Common criteria
45. Accepting all packets
Promiscuous mode
User
Audit Trail
SSH
46. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Java
Finger scanning
IAB
Reciprocal agreement
47. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Senior Management
Repeaters
AES (Advanced Encryption Standard)
Rijndael
48. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
OSI Model
Salami Slicing
COM
Java
49. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
Symmetric
CD-Rom
Granularity
Copyright
50. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Motion detector
Cookies
Vulnerability analysis tools
Echelon