SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Diffie-Hellman
Normalization
Finger scanning
SLE (Single Loss Expectancy or Exposure)
2. Chief Executive Officer
Hacker
Embezzlement
Fiber optic
CEO
3. The output of a hash function is a digest.
Risk Transferring
Transposition
Well-known ports
Digest
4. CISSPs subscribe to a code of ethics for building up the security profession
CD-Rom
Noise & perturbation
Code of ethics
Reciprocal agreement
5. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Replay
Due Diligence
Keystroke logging
Degausser
6. Dialing fixed sets telephone numbers looking for open modem connections to machines
Active attacks
WTLS (Wireless Transport Layer Security)
War dialing
Multithreading
7. Someone who hacks
Trap Door
Senior Management
Hacker
Kerberos
8. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Trap Door
VPN (Virtual Private Network)
Embezzlement
ROM (Read-only memory)
9. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Transposition
Embezzlement
Owner
Content dependant
10. The person that determines the permissions to files. The data owner.
Script kiddies
Phreaker
Owner
CIRT
11. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Authorization creep
Security Perimeter
Trojan horses
Debug
12. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Polymorphic
Keystroke logging
Carnivore
Enticement
13. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
ISDN (Integrated Services Digital Network)
Routers
Asymmetric
Coax
14. Jumping into dumpsters to retrieve information about someone/something/a company
Dumpster diving
OLE
TCSEC
Probing
15. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Hubs
ROT-13
AES (Advanced Encryption Standard)
IRC
16. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Phreaker
Format 7 times
SQL (Structured Query Language)
BIA
17. Public Key Infrastructure
Quantitative
PKI
Hoax
Risk Management
18. The ability to have more than one thread associated with a process
Rijndael
Multithreading
Logic bomb
Due Diligence
19. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
SYN Flood
Virtual Memory/Pagefile.sys
Birthday attack
IAB
20. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Birthday attack
Social engineering
Passive attacks
Owner
21. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Normalization
Penetration testing
Multipartite
Tokens
22. More discriminate than dogs
NAT
Guards
DMZ
TCP Wrappers
23. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Echelon
Smart cards
Session Hijacking
CORBA
24. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
ActiveX Object Linking and Embedding
Twisted pair
DMZ
Replay
25. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
Birthday attack
Active attacks
EF (Exposure Factor)
Multithreading
26. The act of identifying yourself. Providing your identity to a system
Identification
Degausser
Asset Value
Multipartite
27. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
TACACS (Terminal access controller access control system)
/etc/passwd
Sabotage
Patent
28. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Debug
Digital certificates
TACACS (Terminal access controller access control system)
Due Diligence
29. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Separation of duties
Identification
Digital signing
Acceptable use
30. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Macro
SSH
Fiber optic
Detective - Preventive - Corrective
31. Animals with teeth. Not as discriminate as guards
Hardware
Debug
Dogs
Tort
32. Computer Incident Response Team
DOS
EF (Exposure Factor)
CIRT
RADIUS (Remote authentication dial-in user service)
33. Occupant Emergency Plan - Employees are the most important!
ISDN (Integrated Services Digital Network)
OEP
Authorization creep
Rolling hot sites
34. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
Trade Secret
Covert channels
Fraggle
ARO (Annualized Rate of Occurrence)
35. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Data remanence
User
Packet Sniffing
Phreaker
36. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Degausser
Twisted pair
SLE (Single Loss Expectancy or Exposure)
Fiber optic
37. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Due Care
Incentive programs
Hardware
Clipping levels
38. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Technical - Administrative - Physical
Termination procedures
Substitution
Out of band
39. In a separation of duties model - this is where code is checked in and out
Aggregation
Kerberos
Software librarian
Fire extinguisher
40. Also civil law
Sniffing
Logic bomb
Virtual Memory/Pagefile.sys
Tort
41. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Skipjack
Malware
Toneloc
Honey pot
42. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
CD-Rom
CRC (Cyclic Redundancy Check)
Software
Script
43. A war dialing utility
Asset Value
BIA
Penetration testing
Toneloc
44. The user
User
NAT
Asset Value
VLANs
45. Be at least 8 foot tall and have three strands of barbed wire.
Due Care
Fences
Authorization
Social engineering
46. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Senior Management
MOM
Aggregation
Digital signing
47. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Patriot Act
Dictionary Attack
Probing
Buffer overflow
48. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Data Mart
Script
Caesar Cipher
CCTV
49. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Separation of duties
Logic bomb
MOM
Base-64
50. When two or more processes are linked and execute multiple programs simultaneously
Cyphertext only
COOP
Multiprocessing
Debug
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests