SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
PAP (Password Authentication Protocol)
Digest
Certification
War driving
2. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Key Escrow
Risk Management
Security kernel
SLE (Single Loss Expectancy or Exposure)
3. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Social engineering
Clipper Chip
Bastion hosts
Security Perimeter
4. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Warm Site
Inference
Software
Carnivore
5. Network Address Translation
DCOM
NAT
Script
Firewall types
6. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Wiretapping
CIO
DOS
Hearsay Evidence
7. Network devices that operate at layer 3. This device separates broadcast domains.
Hot Site
Security through obscurity
Routers
CGI (The Common Gateway Interface)
8. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Script kiddies
CHAP
CCTV
RAM (Random-access memory)
9. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
Bugtraq
Clipping levels
Carnivore
Brewer-Nash model
10. Enticing people to hit your honeypot to see how they try to access your system.
Back door/ trap door/maintenance hook
Enticement
Debug
CCTV
11. Accepting all packets
Promiscuous mode
Masquerade
Inference
Multithreading
12. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Quality Assurance
Detective - Preventive - Corrective
Privacy Act of 1974
Illegal/Unethical
13. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
BIA
Cyphertext only
Aggregation
Inference
14. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Coax
Risk Analysis
ALE (Annualized Loss Expectancy)
Security Awareness Training
15. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Probing
Bastion hosts
Switches / Bridges
Encryption
16. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.
Twisted pair
Keystroke logging
SLE (Single Loss Expectancy or Exposure)
ARO (Annualized Rate of Occurrence)
17. Method of authenticating to a system. Something that you supply and something you know.
CIO
TCSEC
Username/password
Audit Trail
18. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
Well-known ports
Patriot Act
SLE (Single Loss Expectancy or Exposure)
Risk Transferring
19. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Audit Trail
Security kernel
Brewer-Nash model
ROM (Read-only memory)
20. The person that determines the permissions to files. The data owner.
Finger printing
Cryptanalysis
Normalization
Owner
21. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
ALE (Annualized Loss Expectancy)
Warm Site
Exit interview
Closed network
22. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
Twisted pair
BIOS
Digest
CGI (The Common Gateway Interface)
23. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Symmetric
FAR/FRR/CER
Passive attacks
Content dependant
24. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Debug
Virtual Memory/Pagefile.sys
Separation of duties
Substitution
25. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Separation of duties
SQL (Structured Query Language)
Hubs
Embezzlement
26. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Fiber optic
DDOS
Patent
Passive attacks
27. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Audit Trail
Call tree
Digest
DNS cache poisoning
28. A RFC standard. A mechanism for performing commands on a remote system
Trap Door
Telnet
Rolling hot sites
CIO
29. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Symmetric
CCTV
Encryption
Risk Management
30. Chief Information Officer
CIO
Fraggle
Compiler
Keystroke logging
31. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Session Hijacking
VPN (Virtual Private Network)
Due Care
Trojan horses
32. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Noise & perturbation
Aggregation
Senior Management
SYN Flood
33. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
DCOM
COM
l0pht
DNS cache poisoning
34. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Normalization
Malware
Crosstalk
Non-repudiation
35. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Java
Tailgating / Piggybacking
Repeaters
SQL (Structured Query Language)
36. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
DAD
AES (Advanced Encryption Standard)
Keystroke logging
Symmetric
37. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Fire extinguisher
Audit Trail
Base-64
VPN (Virtual Private Network)
38. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Salami Slicing
Trojan horses
Rijndael
Switches / Bridges
39. Emanations from one wire coupling with another wire
Non-repudiation
Crosstalk
RAM (Random-access memory)
/etc/passwd
40. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Two-Factor Authentication
SSL/TLS
Incentive programs
Toneloc
41. An attempt to trick the system into believing that something false is real
Entrapment
/etc/passwd
Promiscuous mode
Hoax
42. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
SLE (Single Loss Expectancy or Exposure)
Non-repudiation
Cookies
RAM (Random-access memory)
43. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
SSH
Risk Mitigation
Software
Job rotation
44. Also civil law
Sabotage
Tort
Symmetric
Embezzlement
45. A site that has some equipment in place - and can be up within days
User
Warm Site
SSO (Single sign-on)
Illegal/Unethical
46. Assuming someone's session who is unaware of what you are doing
Checksum
Session Hijacking
Birthday attack
Patriot Act
47. The output of a hash function is a digest.
Asset Value
Digest
VPN (Virtual Private Network)
Normalization
48. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Reciprocal agreement
Penetration testing
WAP (Wireless Application Protocol)
Trade Secret
49. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Hoax
Guards
Out of band
Authorization creep
50. Distributed Component Object Model. Microsoft's implementation of CORBA.
Hash
DCOM
Senior Management
Open network