SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
OSI Model
Private Addressing
SESAME
NAT
2. The person that determines the permissions to files. The data owner.
DDOS
Owner
Firmware
TACACS (Terminal access controller access control system)
3. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
DAD
BIA
Rijndael
Tailgating / Piggybacking
4. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Tokens
Brewer-Nash model
Two-Factor Authentication
ISDN (Integrated Services Digital Network)
5. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
SESAME
Illegal/Unethical
Authorization creep
Kerberos
6. A technique to eliminate data redundancy.
Normalization
Due Diligence
Risk Transferring
CIO
7. A RFC standard. A mechanism for performing commands on a remote system
Telnet
WAP (Wireless Application Protocol)
Symmetric
Replay
8. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Detective - Preventive - Corrective
Format 7 times
VPN (Virtual Private Network)
Risk Acceptance
9. Must be in place for you to use a biometric system
Brewer-Nash model
SYN Flood
Biometric profile
Finger scanning
10. Ethernet - Cat5 - Twisted to allow for longer runs.
Expert System
Twisted pair
Switches / Bridges
Open network
11. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Trojan horses
Hoax
TEMPEST
Centralized
12. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Symmetric
OLE
Classes of IP networks
Macro
13. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Cookies
Copyright
NAT
Malware
14. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
DDOS
Warm Site
SYN Flood
Patriot Act
15. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
ARP (Address Resolution Protocol)
Normalization
CIO
Block cipher
16. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Caesar Cipher
Bugtraq
Vulnerability analysis tools
Trojan horses
17. In cryptography - it is a block cipher
Spoofing
Firmware
Skipjack
Firewall types
18. The process of reducing your risks to an acceptable level based on your risk analysis
Risk Mitigation
Tokens
Active attacks
DAD
19. Animals with teeth. Not as discriminate as guards
Tort
Code of ethics
Dogs
Private Addressing
20. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Honey pot
Firewall types
l0pht
Reciprocal agreement
21. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Out of band
Object Oriented Programming
Common criteria
Key Escrow
22. Entails planning and system actions to ensure that a project is following good quality management practices
Authentication
Hot Site
DOS
Quality Assurance
23. The art of breaking code. Testing the strength of an algorithm.
Expert System
Nonce
Cryptanalysis
Authorization creep
24. To not be legal (as far as law is concerned) or ethical
Brute Force
Cryptanalysis
Technical - Administrative - Physical
Illegal/Unethical
25. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Wiretapping
Audit Trail
Out of band
Finger scanning
26. The intercepting of conversations by unintended recipients
Eavesdropping
Macro
Asset Value
Out of band
27. Rolling command center with UPS - satellite - uplink - power - etc.
SSO (Single sign-on)
Wiretapping
Rolling hot sites
Cookies
28. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Data remanence
Brewer-Nash model
SQL (Structured Query Language)
Software librarian
29. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Phreaker
Username/password
Replay
Fiber optic
30. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
OSI Model
CIA
Quantitative
CGI (The Common Gateway Interface)
31. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
TCP Wrappers
Reciprocal agreement
Embezzlement
VPN (Virtual Private Network)
32. Occupant Emergency Plan - Employees are the most important!
OEP
Senior Management
Virtual machine
Risk Acceptance
33. The user
TCP Wrappers
DDOS
User
DOS
34. Basic Input/Output System
BIOS
Data Mart
Cyphertext only
Centralized
35. Computer Incident Response Team
Checksum
Key Escrow
ActiveX Object Linking and Embedding
CIRT
36. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
CORBA
SESAME
EF (Exposure Factor)
Birthday attack
37. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Software
Centralized
Job rotation
Encryption
38. Access control method for database based on the content of the database to provide granular access
Content dependant
WTLS (Wireless Transport Layer Security)
Symmetric
RAM (Random-access memory)
39. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Virtual Memory/Pagefile.sys
Trade Secret
CHAP
Bastion hosts
40. A system designed to stop piggybacking.
MitM
Key Escrow
TCP Wrappers
Man trap
41. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Brewer-Nash model
Honey pot
Promiscuous mode
Asset Value
42. Component Object Model.
Compiler
Halon
DOS
COM
43. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Service packs
MitM
Software
Common criteria
44. A site that has some equipment in place - and can be up within days
Warm Site
DDOS
Patriot Act
Tokens
45. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Script
IRC
Encryption
Echelon
46. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Teardrop
Digital signing
Symmetric
UUEncode
47. Method of authenticating to a system. Something that you supply and something you know.
Spoofing
Fire extinguisher
Cold Site
Username/password
48. Be at least 8 foot tall and have three strands of barbed wire.
Active attacks
Scanning
Telnet
Fences
49. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
Software development lifecycle
Stream cipher
Mandatory vacation
50. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Tokens
ROM (Read-only memory)
Common criteria
Digest
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests