SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Random Number Base
Nonce
Spoofing
Tokens
Session Hijacking
2. Distributed Component Object Model. Microsoft's implementation of CORBA.
Smart cards
DCOM
Custodian
Debug
3. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
ROM (Read-only memory)
Software
Back door/ trap door/maintenance hook
Termination procedures
4. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Risk Analysis
Decentralized
Authorization
CD-Rom
5. When two or more processes are linked and execute multiple programs simultaneously
Trojan horses
Spoofing
Job rotation
Multiprocessing
6. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
SSH
Cold Site
RADIUS (Remote authentication dial-in user service)
Birthday attack
7. Someone who hacks
l0pht
Hacker
Hoax
Sniffing
8. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
CORBA
Reciprocal agreement
Passive attacks
RAM (Random-access memory)
9. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Phreaker
PKI
Mandatory vacation
Polymorphic
10. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Key Escrow
Routers
Code of ethics
Multitasking
11. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Change management
Vulnerability analysis tools
Nonce
Multitasking
12. A network that uses standard protocols (TCP/IP)
Open network
Clipper Chip
Virtual Memory/Pagefile.sys
DOS
13. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Script
Common criteria
CIRT
SQL (Structured Query Language)
14. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Accreditation
Transposition
Job rotation
Embezzlement
15. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Expert systems
Degausser
Digest
Symmetric
16. Scanning the airwaves for radio transmissions
Accreditation
Audit Trail
Scanning
Privacy Act of 1974
17. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Technical - Administrative - Physical
Patriot Act
Due Diligence
CIRT
18. The process of reducing your risks to an acceptable level based on your risk analysis
Risk Mitigation
Caesar Cipher
Throughput of a Biometric System
Telnet
19. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Rolling hot sites
Buffer overflow
Sabotage
Authorization
20. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Well-known ports
Coax
Asset Value
WAP (Wireless Application Protocol)
21. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Risk Transferring
Senior Management
l0pht
Audit Trail
22. In a separation of duties model - this is where code is checked in and out
Software librarian
Routers
Phreaker
Bastion hosts
23. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Due Diligence
Dictionary Attack
Session Hijacking
Clipping levels
24. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Spoofing
Base-64
VLANs
Macro
25. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Bugtraq
Certification
CD-Rom
ARO (Annualized Rate of Occurrence)
26. Common Object Request Broker Architecture.
DDOS
CORBA
Code of ethics
Raid 0 - 1 - 3 - 5
27. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
Username/password
Halon
ROT-13
RAM (Random-access memory)
28. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
Sabotage
Risk Transferring
BIA
Clipping levels
29. Reasonable doubt
Identification
Attenuation
Burden of Proof
Tailgating / Piggybacking
30. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
CIO
DNS cache poisoning
Brewer-Nash model
Risk Acceptance
31. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Multithreading
Smurf
BIOS
CHAP
32. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Username/password
Dogs
Software development lifecycle
Hash
33. Closed Circuit Television
Sniffing
Joke
Coax
CCTV
34. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
OSI Model
Penetration testing
CIRT
MitM
35. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
RADIUS (Remote authentication dial-in user service)
Sniffing
Block cipher
Cyphertext only
36. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Expert System
Packet Sniffing
Passive attacks
Finger scanning
37. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Virtual Memory/Pagefile.sys
Common criteria
Digest
Macro
38. The ability to have more than one thread associated with a process
EF (Exposure Factor)
Multithreading
DDOS
Polymorphism
39. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Block cipher
Out of band
Authentication
Cookies
40. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
EF (Exposure Factor)
l0pht
Social engineering
Security Perimeter
41. Transferring your risk to someone else - typically an insurance company
VPN (Virtual Private Network)
Boot-sector Virus
Risk Transferring
Dictionary Attack
42. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Trade Secret
Telnet
COM
Hearsay Evidence
43. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Trap Door
Aggregation
Exit interview
WAP (Wireless Application Protocol)
44. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
CD-Rom
Block cipher
Cyphertext only
Passive attacks
45. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Software
COM
Trademark
Hardware
46. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Symmetric
Skipjack
Inference
Halon
47. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
DAD
Switches / Bridges
Boot-sector Virus
Java
48. Assuming someone's session who is unaware of what you are doing
Key Escrow
Quantitative
Session Hijacking
Software librarian
49. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
SSL/TLS
Polymorphic
Cookies
BIOS
50. These viruses usually infect both boot records and files.
OEP
Code of ethics
Checksum
Multipartite
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests