SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Schema
CGI (The Common Gateway Interface)
Symmetric
VLANs
2. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Authorization creep
Brewer-Nash model
Asymmetric
Senior Management
3. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Inference
Polymorphism
Scanning
Decentralized
4. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Asymmetric
VLANs
TEMPEST
Firmware
5. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Content dependant
l0pht
Fiber optic
Out of band
6. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Exit interview
CORBA
COOP
Risk Acceptance
7. When security is managed at many different points in an organization
Malware
Owner
Software development lifecycle
Decentralized
8. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Data remanence
War driving
War dialing
Coax
9. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Audit Trail
Out of band
Malware
Degausser
10. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Noise & perturbation
SQL (Structured Query Language)
Boot-sector Virus
Digital certificates
11. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
Stream cipher
MitM
SSO (Single sign-on)
Replay
12. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
l0pht
Symmetric
Mandatory vacation
Hearsay Evidence
13. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Warm Site
Quantitative
Joke
Compiler
14. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Quality Assurance
Software
Tailgating / Piggybacking
ALE (Annualized Loss Expectancy)
15. Good for distance - longer than 100M
Change management
Coax
IRC
COM
16. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Packet Sniffing
WAP (Wireless Application Protocol)
Closed network
CIO
17. These can be used to verify that public keys belong to certain individuals.
War driving
Social engineering
Digital certificates
Scanning
18. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
CRC (Cyclic Redundancy Check)
Session Hijacking
Back door/ trap door/maintenance hook
SQL (Structured Query Language)
19. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Schema
l0pht
Sniffing
Fire extinguisher
20. Method of authenticating to a system. Something that you supply and something you know.
Username/password
VPN (Virtual Private Network)
SSO (Single sign-on)
Expert systems
21. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Routers
Quantitative
SESAME
Cookies
22. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
Script kiddies
CRC (Cyclic Redundancy Check)
Decentralized
Echelon
23. Also known as a tunnel)
Privacy Act of 1974
VPN (Virtual Private Network)
Malware
Granularity
24. Access control method for database based on the content of the database to provide granular access
Digital signing
Patent
IAB
Content dependant
25. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Data remanence
Smurf
Smart cards
Cyphertext only
26. Emanations from one wire coupling with another wire
Crosstalk
Brute force
Malware
Asset Value
27. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Senior Management
TCSEC
Checksum
Teardrop
28. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Quantitative
Hot Site
Expert System
Cryptanalysis
29. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Security Awareness Training
Termination procedures
Multithreading
Software librarian
30. A RFC standard. A mechanism for performing commands on a remote system
Biometric profile
User
Security Awareness Training
Telnet
31. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Coax
ROT-13
User
Key Escrow
32. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Twisted pair
ActiveX Object Linking and Embedding
ROM (Read-only memory)
Finger scanning
33. Public Key Infrastructure
Guards
RADIUS (Remote authentication dial-in user service)
CEO
PKI
34. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Twisted pair
Back door/ trap door/maintenance hook
Content dependant
Separation of duties
35. Continuation of Operations Plan
Software
Authentication
Smurf
COOP
36. Threat to physical security.
Sabotage
CORBA
Asymmetric
CIA
37. These viruses usually infect both boot records and files.
Fire extinguisher
Biometrics
Multipartite
Authorization
38. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Classes of IP networks
Tort
Multithreading
Passive attacks
39. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Centralized
MitM
Salami Slicing
FAR/FRR/CER
40. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Clipper Chip
Honey pot
Finger scanning
Aggregation
41. The person that determines the permissions to files. The data owner.
Active attacks
Owner
Code of ethics
Closed network
42. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Multithreading
Cyphertext only
CIO
Clipper Chip
43. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Routers
Granularity
Brute force
DCOM
44. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Identification
PKI
Hot Site
War driving
45. Network devices that operate at layer 3. This device separates broadcast domains.
Hacker
Software librarian
Routers
Fiber optic
46. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Qualitative
SSO (Single sign-on)
Job rotation
ROT-13
47. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Worm
Digital signing
Multitasking
Biometrics
48. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Script kiddies
CCTV
Hackers
Content dependant
49. Chief Executive Officer
Due Care
CEO
Raid 0 - 1 - 3 - 5
Clipper Chip
50. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Clipping levels
Fences
Private Addressing
Granularity