SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Artificial Neural Networks (ANN)
SLE (Single Loss Expectancy or Exposure)
Patriot Act
Eavesdropping
2. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Fire extinguisher
Script kiddies
Teardrop
Clipper Chip
3. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Fire extinguisher
Detective - Preventive - Corrective
Inference
Twisted pair
4. Ethernet - Cat5 - Twisted to allow for longer runs.
Brewer-Nash model
Twisted pair
Schema
Block cipher
5. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Birthday attack
Hackers
Buffer overflow
Call tree
6. Scanning the airwaves for radio transmissions
Scanning
Accreditation
Object Oriented Programming
Routers
7. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Macro
Privacy Act of 1974
Open network
Key Escrow
8. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Buffer overflow
War dialing
PKI
Granularity
9. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Separation of duties
Hearsay Evidence
Key Escrow
Finger printing
10. An instance of a scripting language
User
Script
ARO (Annualized Rate of Occurrence)
Dumpster diving
11. More discriminate than dogs
Identification
Multiprocessing
Guards
VPN (Virtual Private Network)
12. A type of circuit switched telephone network system - designed to allow digital transmission of voice and data over ordinary telephone copper wires - resulting in better quality and higher speeds than available with analog systems.
SSH
ISDN (Integrated Services Digital Network)
Audit Trail
Fences
13. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Honey pot
TCSEC
MitM
Virtual Memory/Pagefile.sys
14. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
OSI Model
Session Hijacking
Telnet
Spoofing
15. Be at least 8 foot tall and have three strands of barbed wire.
Routers
MOM
Script kiddies
Fences
16. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
Hacker
PKI
Block cipher
SSL/TLS
17. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
DAD
Joke
TEMPEST
Teardrop
18. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
War driving
Fences
ALE (Annualized Loss Expectancy)
Teardrop
19. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Malware
Base-64
Smurf
Boot-sector Virus
20. A RFC standard. A mechanism for performing commands on a remote system
CIRT
Telnet
Brute Force
Sniffing
21. The practice of following someone with a security code or keycard through a security door - generally in workplaces.
CCTV
DNS cache poisoning
Tailgating / Piggybacking
Asset Value
22. Jumping into dumpsters to retrieve information about someone/something/a company
Dumpster diving
Joke
Security through obscurity
Echelon
23. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Hearsay Evidence
RADIUS (Remote authentication dial-in user service)
ALE (Annualized Loss Expectancy)
DMZ
24. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Smurf
Enticement
Boot-sector Virus
Polymorphism
25. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
COM
Biometrics
Hacker
User
26. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
SQL (Structured Query Language)
Active attacks
MitM
Asymmetric
27. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Software development lifecycle
Senior Management
l0pht
Logic bomb
28. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
CIO
Covert channels
Masquerade
Trade Secret
29. Same as a block cipher except that it is applied to a data stream one bit at a time
Passive attacks
Stream cipher
Exit interview
Audit Trail
30. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
Reciprocal agreement
Call tree
Quantitative
ARP (Address Resolution Protocol)
31. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Warm Site
ROM (Read-only memory)
Rijndael
SYN Flood
32. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
Covert channels
Scanning
Worm
Spoofing
33. Chief Information Officer
Service packs
Username/password
Hackers
CIO
34. A network entity that provides a single entrance / exit point to the Internet.
WTLS (Wireless Transport Layer Security)
TEMPEST
Bastion hosts
Authentication
35. A network that uses standard protocols (TCP/IP)
Wiretapping
Boot-sector Virus
Open network
Script kiddies
36. Using ICMP to diagram a network
Probing
WTLS (Wireless Transport Layer Security)
Key Escrow
Clipping levels
37. A hidden communications channel on a system that allows for the bypassing of the system security policy
Virtual Memory/Pagefile.sys
AES (Advanced Encryption Standard)
Covert channels
Skipjack
38. The practice of obtaining confidential information by manipulation of legitimate users.
Scanning
Social engineering
Common criteria
Classes of IP networks
39. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Buffer overflow
OSI Model
ROM (Read-only memory)
Joke
40. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Data Mart
Cookies
Trojan horses
Expert System
41. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.
Keystroke logging
Trojan horses
Risk Transferring
PAP (Password Authentication Protocol)
42. A technique to eliminate data redundancy.
Base-64
Mandatory vacation
Tokens
Normalization
43. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Call tree
Multiprocessing
Skipjack
Smurf
44. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Exit interview
Embezzlement
Fraggle
Asymmetric
45. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Digital certificates
Polymorphic
ALE (Annualized Loss Expectancy)
Audit Trail
46. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Noise & perturbation
Worm
Security Awareness Training
Centralized
47. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
Tokens
SLE (Single Loss Expectancy or Exposure)
Brewer-Nash model
CD-Rom
48. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Clipping levels
Twisted pair
Senior Management
UUEncode
49. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
DMZ
Penetration testing
CORBA
Virtual Memory/Pagefile.sys
50. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Tort
Due Care
Privacy Act of 1974
Cyphertext only