SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A military standard defining controls for emanation protection
Halon
TEMPEST
DMZ
Attenuation
2. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Fiber optic
Illegal/Unethical
OSI Model
Hackers
3. A gas used in fire suppression. Not human safe. Chemical reaction.
Common criteria
Halon
l0pht
Multithreading
4. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Brute Force
Multithreading
Hot Site
Teardrop
5. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
SQL (Structured Query Language)
DDOS
Replay
6. Animals with teeth. Not as discriminate as guards
Dogs
User
Repeaters
Risk Mitigation
7. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Birthday attack
Carnivore
Non-repudiation
TCSEC
8. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Cyphertext only
Accreditation
Rijndael
Transposition
9. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
Joke
ISDN (Integrated Services Digital Network)
Exit interview
Logic bomb
10. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Cyphertext only
Reciprocal agreement
Logic bomb
Carnivore
11. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
Kerberos
Due Diligence
Vulnerability analysis tools
Well-known ports
12. Assuming someone's session who is unaware of what you are doing
Session Hijacking
Identification
DHCP
Throughput of a Biometric System
13. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Echelon
Technical - Administrative - Physical
Salami Slicing
Asset Value
14. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Hackers
Mandatory vacation
Fraggle
Smart cards
15. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Privacy Act of 1974
Session Hijacking
BIOS
Two-Factor Authentication
16. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
ISDN (Integrated Services Digital Network)
RADIUS (Remote authentication dial-in user service)
Incentive programs
Sabotage
17. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
CIRT
Data Mart
Virtual Memory/Pagefile.sys
Trap Door
18. A RFC standard. A mechanism for performing commands on a remote system
Macro
Telnet
ActiveX Object Linking and Embedding
Asymmetric
19. This is an open international standard for applications that use wireless communications.
Schema
Change management
Malware
WAP (Wireless Application Protocol)
20. The frequency with which a threat is expected to occur.
Change management
Digest
Teardrop
ARO (Annualized Rate of Occurrence)
21. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Cryptanalysis
Security through obscurity
ARO (Annualized Rate of Occurrence)
Private Addressing
22. A network entity that provides a single entrance / exit point to the Internet.
OEP
Echelon
Base-64
Bastion hosts
23. Signal degradation as it moves farther from its source
Attenuation
SYN Flood
Entrapment
Embezzlement
24. In cryptography - it is a block cipher
Degausser
Brute force
Artificial Neural Networks (ANN)
Skipjack
25. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
Two-Factor Authentication
ARP (Address Resolution Protocol)
Session Hijacking
TCP Wrappers
26. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Trap Door
Software development lifecycle
Man trap
Closed network
27. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Clipper Chip
Debug
Sabotage
Patriot Act
28. Personal - Network - and Application
Open network
Multitasking
Security kernel
Firewall types
29. In a separation of duties model - this is where code is checked in and out
DMZ
Software librarian
CIA
Smurf
30. Computer Incident Response Team
Base-64
Due Care
CIRT
Accreditation
31. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Detective - Preventive - Corrective
Callback Security/Call Forwarding
Senior Management
Vulnerability analysis tools
32. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Smart cards
Fences
Phreaker
Reciprocal agreement
33. Closed Circuit Television
Hubs
ISDN (Integrated Services Digital Network)
Well-known ports
CCTV
34. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Fraud
Telnet
Granularity
Encryption
35. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Job rotation
Multipartite
Packet Sniffing
Normalization
36. Confidentiality - Integrity - and Availability
Rolling hot sites
Multitasking
Biometric profile
CIA
37. A technique to eliminate data redundancy.
Hardware
WTLS (Wireless Transport Layer Security)
Authentication
Normalization
38. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Software development lifecycle
Job rotation
Debug
Substitution
39. Jumping into dumpsters to retrieve information about someone/something/a company
Phreaker
User
Wiretapping
Dumpster diving
40. Transferring your risk to someone else - typically an insurance company
Exit interview
Burden of Proof
Checksum
Risk Transferring
41. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Risk Transferring
Boot-sector Virus
MOM
Key Escrow
42. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
UUEncode
WTLS (Wireless Transport Layer Security)
DOS
Hacker
43. A method of encrypting text to produce cipher text in which a cryptographic key and algorithm are applied to a block of data as a group instead of one bit at a time
CORBA
Polymorphism
Block cipher
Common criteria
44. A site that has some equipment in place - and can be up within days
Rolling hot sites
COOP
Warm Site
Accreditation
45. In the broadest sense - a fraud is a deception made for personal gain
PKI
Firmware
Fraud
Twisted pair
46. Emanations from one wire coupling with another wire
Twisted pair
RADIUS (Remote authentication dial-in user service)
Hardware
Crosstalk
47. An attempt to trick the system into believing that something false is real
Quality Assurance
Audit Trail
Trademark
Hoax
48. Encompasses Risk Analysis and Risk Mitigation
Polymorphism
Risk Management
Promiscuous mode
TCB
49. Software designed to infiltrate or damage a computer system - without the owner's consent.
CCTV
Centralized
Embezzlement
Malware
50. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Inference
Authorization
Joke
Fire extinguisher
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests