SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
NAT
Centralized
Halon
Key Escrow
2. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Guards
Trojan horses
Session Hijacking
BIA
3. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Key Escrow
Copyright
Echelon
Hackers
4. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Phreaker
Firmware
Object Oriented Programming
Rijndael
5. Enticing people to hit your honeypot to see how they try to access your system.
Risk Analysis
Enticement
Worm
Covert channels
6. The person that controls access to the data
Artificial Neural Networks (ANN)
Owner
Custodian
DMZ
7. A site that is ready physically but has no hardware in place - all it has is HVAC
Cryptanalysis
Covert channels
Cold Site
Boot-sector Virus
8. To not be legal (as far as law is concerned) or ethical
CORBA
SSH
EF (Exposure Factor)
Illegal/Unethical
9. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Well-known ports
DDOS
Joke
Detective - Preventive - Corrective
10. An attack that is similar to smurf but instead of using ICMP (ping) it uses UDP as its weapon of choice. It broadcasts a spoofed UDP packet to the amplifying network.
Security Perimeter
BIOS
Fraggle
TEMPEST
11. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
OSI Model
Dictionary Attack
Encryption
Hardware
12. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
Quality Assurance
Fraggle
SYN Flood
Call tree
13. Transferring your risk to someone else - typically an insurance company
Fraggle
Tokens
Risk Transferring
SLE (Single Loss Expectancy or Exposure)
14. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Out of band
Routers
Smurf
Illegal/Unethical
15. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
Tokens
Hash
SQL (Structured Query Language)
CGI (The Common Gateway Interface)
16. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Common criteria
Cold Site
Privacy Act of 1974
Raid 0 - 1 - 3 - 5
17. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Brewer-Nash model
ROM (Read-only memory)
Out of band
Decentralized
18. Computer Incident Response Team
Aggregation
Hash
CIRT
Wiretapping
19. Motivational tools for employee awareness to get them to report security flaws in an organization
Copyright
Telnet
Incentive programs
IAB
20. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
CCTV
Common criteria
Worm
Service packs
21. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Degausser
DOS
Clipper Chip
Job rotation
22. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Object Oriented Programming
DHCP
DOS
Non-repudiation
23. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Clipping levels
Software
Username/password
Spoofing
24. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
Callback Security/Call Forwarding
SLE (Single Loss Expectancy or Exposure)
Telnet
Technical - Administrative - Physical
25. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
ROT-13
Sniffing
Job rotation
WAP (Wireless Application Protocol)
26. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Hash
Vulnerability analysis tools
Change management
Key Escrow
27. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Clipping levels
Brute force
DCOM
Granularity
28. Reasonable doubt
Rijndael
Classes of IP networks
Burden of Proof
NAT
29. Rolling command center with UPS - satellite - uplink - power - etc.
Scanning
Vulnerability analysis tools
Warm Site
Rolling hot sites
30. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
Normalization
Exit interview
Termination procedures
Motion detector
31. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
Sabotage
Penetration testing
Trade Secret
RADIUS (Remote authentication dial-in user service)
32. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Authorization creep
Sniffing
Cryptanalysis
Certification
33. White hat l0pht
Switches / Bridges
Accountability
Bugtraq
Asymmetric
34. A hidden communications channel on a system that allows for the bypassing of the system security policy
Script
Virtual machine
Routers
Covert channels
35. Also known as a tunnel)
VPN (Virtual Private Network)
Custodian
Multitasking
Asymmetric
36. Network devices that operate at layer 3. This device separates broadcast domains.
Hash
Tailgating / Piggybacking
Man trap
Routers
37. Method of authenticating to a system. Something that you supply and something you know.
COM
Code of ethics
Rolling hot sites
Username/password
38. Emanations from one wire coupling with another wire
Crosstalk
Script
DMZ
SYN Flood
39. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Phreaker
AES (Advanced Encryption Standard)
CIA
Finger scanning
40. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Routers
Clipping levels
Smurf
Quality Assurance
41. A mechanism by which connections to TCP services on a system are allowed or disallowed
TCP Wrappers
/etc/passwd
Two-Factor Authentication
Patent
42. This is an open international standard for applications that use wireless communications.
IRC
Trade Secret
WAP (Wireless Application Protocol)
BIOS
43. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
ARP (Address Resolution Protocol)
Compiler
Warm Site
Trademark
44. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
Macro
Active attacks
ActiveX Object Linking and Embedding
Substitution
45. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Data remanence
MOM
Teardrop
OEP
46. A network entity that provides a single entrance / exit point to the Internet.
Active attacks
Risk Transferring
Bastion hosts
Smart cards
47. Making individuals accountable for their actions on a system typically through the use of auditing
TEMPEST
Privacy Act of 1974
Nonce
Accountability
48. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Closed network
ActiveX Object Linking and Embedding
Polymorphism
OEP
49. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Echelon
Dictionary Attack
Asset Value
Coax
50. The user
Call tree
Guards
Private Addressing
User