SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Back door/ trap door/maintenance hook
Change management
Fire extinguisher
Finger printing
2. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Masquerade
Patent
Multitasking
Base-64
3. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Cookies
Phreaker
Penetration testing
Owner
4. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
PAP (Password Authentication Protocol)
Trojan horses
Multiprocessing
Replay
5. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Back door/ trap door/maintenance hook
Spoofing
Smurf
Exit interview
6. Data storage formats and equipment that allow the stored data to be accessed in any order
RAM (Random-access memory)
Job rotation
RADIUS (Remote authentication dial-in user service)
Quality Assurance
7. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Compiler
Mandatory vacation
SSL/TLS
Dictionary Attack
8. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
SSH
Cold Site
Cookies
Masquerade
9. When security is managed at a central point in an organization
Centralized
Well-known ports
DNS cache poisoning
Security through obscurity
10. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
EF (Exposure Factor)
RADIUS (Remote authentication dial-in user service)
UUEncode
Software librarian
11. The output of a hash function is a digest.
Raid 0 - 1 - 3 - 5
CIO
Service packs
Digest
12. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
SSH
Telnet
ARP (Address Resolution Protocol)
Private Addressing
13. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Session Hijacking
Username/password
Penetration testing
Rolling hot sites
14. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Code of ethics
Fire extinguisher
ActiveX Object Linking and Embedding
Caesar Cipher
15. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Custodian
Tokens
Multiprocessing
Audit Trail
16. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Penetration testing
Embezzlement
Toneloc
Checksum
17. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Telnet
Sabotage
Job rotation
Security Perimeter
18. The process of reducing your risks to an acceptable level based on your risk analysis
Qualitative
Risk Mitigation
Twisted pair
Tokens
19. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
l0pht
Script kiddies
Sniffing
Telnet
20. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
TACACS (Terminal access controller access control system)
Transposition
War driving
Hackers
21. Personal - Network - and Application
Firmware
Firewall types
Authorization creep
SESAME
22. Reasonable doubt
Burden of Proof
Tokens
Inference
SESAME
23. When two or more processes are linked and execute multiple programs simultaneously
Cryptanalysis
Entrapment
Script kiddies
Multiprocessing
24. A network entity that provides a single entrance / exit point to the Internet.
Copyright
Bastion hosts
Kerberos
Crosstalk
25. The intercepting of conversations by unintended recipients
Coax
Risk Analysis
DAD
Eavesdropping
26. Signal degradation as it moves farther from its source
PAP (Password Authentication Protocol)
Qualitative
Attenuation
Carnivore
27. Once authenticated - the level of access you have to a system
Hoax
Authorization
Hash
Change management
28. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Well-known ports
Reciprocal agreement
Identification
Exit interview
29. In cryptography - it is a block cipher
Trap Door
Skipjack
Carnivore
Owner
30. Public Key Infrastructure
PKI
Compiler
Artificial Neural Networks (ANN)
Polymorphic
31. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Keystroke logging
Fire extinguisher
ARP (Address Resolution Protocol)
Call tree
32. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
SYN Flood
Asset Value
Entrapment
l0pht
33. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Qualitative
Detective - Preventive - Corrective
Tort
Exit interview
34. These viruses usually infect both boot records and files.
Security through obscurity
Incentive programs
Eavesdropping
Multipartite
35. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
CD-Rom
EF (Exposure Factor)
ISDN (Integrated Services Digital Network)
Cryptanalysis
36. A network that mimics the brain
Social engineering
Artificial Neural Networks (ANN)
Eavesdropping
Risk Acceptance
37. Object Linking and Embedding. The ability of an object to be embedded into another object.
Warm Site
Quality Assurance
OLE
Callback Security/Call Forwarding
38. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Back door/ trap door/maintenance hook
Covert channels
Polymorphism
Trade Secret
39. The act of identifying yourself. Providing your identity to a system
Custodian
Identification
TACACS (Terminal access controller access control system)
Senior Management
40. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Worm
Technical - Administrative - Physical
Penetration testing
Burden of Proof
41. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
ALE (Annualized Loss Expectancy)
ROM (Read-only memory)
Burden of Proof
OEP
42. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
DAD
Risk Transferring
Noise & perturbation
Service packs
43. Network Address Translation
NAT
Centralized
Man trap
SLE (Single Loss Expectancy or Exposure)
44. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Switches / Bridges
Guards
TCSEC
SQL (Structured Query Language)
45. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Back door/ trap door/maintenance hook
Acceptable use
Rijndael
Accountability
46. A war dialing utility
Telnet
Toneloc
Risk Management
Bastion hosts
47. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
WAP (Wireless Application Protocol)
Bastion hosts
Decentralized
Transposition
48. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
CIO
Dogs
FAR/FRR/CER
Tort
49. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Replay
Session Hijacking
CORBA
Polymorphic
50. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Content dependant
Buffer overflow
Brute force
Acceptable use
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests