SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Phreaker
SQL (Structured Query Language)
Data Mart
Identification
2. Disclosure - Alteration - Destruction. These things break the CIA triad
Centralized
Salami Slicing
DAD
Replay
3. The practice of obtaining confidential information by manipulation of legitimate users.
Keystroke logging
Termination procedures
Social engineering
Reciprocal agreement
4. Public Key Infrastructure
Checksum
PKI
Privacy Act of 1974
Macro
5. Personal - Network - and Application
Trademark
Firewall types
Encryption
CORBA
6. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Cold Site
TCSEC
Closed network
CORBA
7. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Hacker
Block cipher
CIA
Digital signing
8. Dialing fixed sets telephone numbers looking for open modem connections to machines
Back door/ trap door/maintenance hook
Clipping levels
War dialing
Owner
9. Entails planning and system actions to ensure that a project is following good quality management practices
Trade Secret
UUEncode
Quality Assurance
Substitution
10. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
Cookies
COM
OSI Model
RADIUS (Remote authentication dial-in user service)
11. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Bastion hosts
Hearsay Evidence
Debug
Multipartite
12. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
VPN (Virtual Private Network)
AES (Advanced Encryption Standard)
Eavesdropping
Back door/ trap door/maintenance hook
13. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Format 7 times
Debug
CIA
CRC (Cyclic Redundancy Check)
14. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
OEP
Telnet
Expert systems
Detective - Preventive - Corrective
15. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
BIA
Toneloc
Brute Force
Privacy Act of 1974
16. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
VLANs
Private Addressing
Promiscuous mode
SYN Flood
17. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Copyright
Classes of IP networks
Fraud
Java
18. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
EF (Exposure Factor)
Biometric profile
Echelon
Technical - Administrative - Physical
19. Internet Architecture Board. This board is responsible for protecting the Internet.
IAB
Due Diligence
Firewall types
ARP (Address Resolution Protocol)
20. A technique to eliminate data redundancy.
Firmware
Normalization
WTLS (Wireless Transport Layer Security)
Nonce
21. Encompasses Risk Analysis and Risk Mitigation
Boot-sector Virus
Risk Management
ARO (Annualized Rate of Occurrence)
Out of band
22. Setting up the user to access the honeypot for reasons other than the intent to harm.
Entrapment
Trojan horses
Covert channels
Artificial Neural Networks (ANN)
23. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Halon
Packet Sniffing
Attenuation
Job rotation
24. Object Linking and Embedding. The ability of an object to be embedded into another object.
OLE
TCP Wrappers
Fraud
Certification
25. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Digital certificates
Dogs
Audit Trail
Security kernel
26. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Passive attacks
UUEncode
Two-Factor Authentication
Multitasking
27. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Firmware
Key Escrow
Biometrics
Salami Slicing
28. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Finger printing
War dialing
BIA
Diffie-Hellman
29. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Non-repudiation
DAD
COOP
OEP
30. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Illegal/Unethical
SSL/TLS
Cyphertext only
CCTV
31. A site that has some equipment in place - and can be up within days
Acceptable use
CEO
Warm Site
Virtual Memory/Pagefile.sys
32. Also known as a tunnel)
Rolling hot sites
Trap Door
Brute force
VPN (Virtual Private Network)
33. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.
TCB
Fences
Authentication
DCOM
34. The output of a hash function is a digest.
COM
Tailgating / Piggybacking
DAD
Digest
35. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
COOP
Fraud
TCB
OSI Model
36. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
Due Diligence
War dialing
Biometric profile
BIA
37. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
COOP
Trademark
Packet Sniffing
Polymorphism
38. Rolling command center with UPS - satellite - uplink - power - etc.
Rolling hot sites
Boot-sector Virus
Key Escrow
Non-repudiation
39. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
CD-Rom
Incentive programs
Teardrop
Clipping levels
40. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
ActiveX Object Linking and Embedding
Fraud
OEP
User
41. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Tailgating / Piggybacking
Noise & perturbation
Object Oriented Programming
Phreaker
42. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Polymorphism
VLANs
Buffer overflow
Dogs
43. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
DHCP
CIRT
Social engineering
DNS cache poisoning
44. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Polymorphic
Centralized
Risk Mitigation
CIO
45. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Brute force
Dictionary Attack
Hardware
Hubs
46. A site that is ready physically but has no hardware in place - all it has is HVAC
Username/password
Cold Site
TACACS (Terminal access controller access control system)
Granularity
47. The real cost of acquiring/maintaining/developing a system
Enticement
Service packs
RAM (Random-access memory)
Asset Value
48. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Due Care
Firmware
Macro
Smurf
49. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Session Hijacking
Risk Transferring
Exit interview
User
50. Using ICMP to diagram a network
Skipjack
Virtual Memory/Pagefile.sys
Copyright
Probing