SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Risk Analysis
VLANs
ARP (Address Resolution Protocol)
Quantitative
2. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Multitasking
Senior Management
Eavesdropping
Symmetric
3. This is an open international standard for applications that use wireless communications.
Custodian
Callback Security/Call Forwarding
WAP (Wireless Application Protocol)
CIRT
4. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Security Awareness Training
Bastion hosts
Echelon
Switches / Bridges
5. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Firmware
Fraud
Two-Factor Authentication
Centralized
6. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Bastion hosts
Degausser
Fraggle
WAP (Wireless Application Protocol)
7. Encompasses Risk Analysis and Risk Mitigation
Routers
CGI (The Common Gateway Interface)
Risk Management
Joke
8. Same as a block cipher except that it is applied to a data stream one bit at a time
/etc/passwd
Asymmetric
Biometrics
Stream cipher
9. Basic Input/Output System
Well-known ports
Tokens
BIOS
Username/password
10. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Fire extinguisher
Packet Sniffing
AES (Advanced Encryption Standard)
Multiprocessing
11. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Penetration testing
Patent
Debug
MitM
12. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Two-Factor Authentication
DDOS
Guards
Switches / Bridges
13. In cryptography - it is a block cipher
Promiscuous mode
Skipjack
ActiveX Object Linking and Embedding
Firmware
14. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
DCOM
Transposition
/etc/passwd
Data Mart
15. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Brewer-Nash model
CORBA
Identification
Certification
16. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Cookies
Block cipher
Exit interview
Firmware
17. Object Linking and Embedding. The ability of an object to be embedded into another object.
OLE
Repeaters
Sabotage
Back door/ trap door/maintenance hook
18. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Cookies
Authorization
Audit Trail
Authorization creep
19. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Penetration testing
Well-known ports
SLE (Single Loss Expectancy or Exposure)
Brute force
20. A card that holds information that must be authenticated to before it can reveal the information that it is holding
ROT-13
Smart cards
ISDN (Integrated Services Digital Network)
CHAP
21. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Brute force
Birthday attack
Enticement
/etc/passwd
22. Repeats the signal. It amplifies the signal before sending it on.
Risk Analysis
Technical - Administrative - Physical
Repeaters
CRC (Cyclic Redundancy Check)
23. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Security Perimeter
Decentralized
Separation of duties
Encryption
24. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Rijndael
Virtual machine
Trade Secret
DDOS
25. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
PKI
Fraggle
OSI Model
Reciprocal agreement
26. The practice of obtaining confidential information by manipulation of legitimate users.
Security kernel
Polymorphic
Social engineering
CIO
27. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Spoofing
Warm Site
Content dependant
Penetration testing
28. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.
TCB
Closed network
Multitasking
Patent
29. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
OLE
Skipjack
Crosstalk
30. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Centralized
Mandatory vacation
Patent
Hash
31. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Back door/ trap door/maintenance hook
Burden of Proof
/etc/passwd
ISDN (Integrated Services Digital Network)
32. The person that determines the permissions to files. The data owner.
Data remanence
Quality Assurance
VLANs
Owner
33. Network device that operates at layer 1. Concentrator.
Hearsay Evidence
DOS
Hubs
Closed network
34. Confidentiality - Integrity - and Availability
DOS
Man trap
CEO
CIA
35. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Teardrop
Packet Sniffing
Fences
UUEncode
36. Computer Incident Response Team
Macro
Multiprocessing
Session Hijacking
CIRT
37. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Username/password
Illegal/Unethical
Debug
SQL (Structured Query Language)
38. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Due Care
Firewall types
Biometric profile
Privacy Act of 1974
39. Dynamic Host Configuration Protocol.
Digest
DHCP
Classes of IP networks
VPN (Virtual Private Network)
40. Dialing fixed sets telephone numbers looking for open modem connections to machines
Schema
Entrapment
War dialing
EF (Exposure Factor)
41. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
CIA
/etc/passwd
Firewall types
DMZ
42. Be at least 8 foot tall and have three strands of barbed wire.
UUEncode
Sabotage
Asset Value
Fences
43. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
Service packs
Probing
SLE (Single Loss Expectancy or Exposure)
Security Perimeter
44. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Eavesdropping
RAM (Random-access memory)
Boot-sector Virus
Spoofing
45. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Authentication
Firmware
User
Passive attacks
46. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
UUEncode
Multiprocessing
Carnivore
Termination procedures
47. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
Expert systems
CHAP
DOS
Biometrics
48. Distributed Component Object Model. Microsoft's implementation of CORBA.
Covert channels
TACACS (Terminal access controller access control system)
Polymorphism
DCOM
49. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Software
Multiprocessing
Buffer overflow
Fraud
50. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Throughput of a Biometric System
Data Mart
Detective - Preventive - Corrective
TCB