SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Salami Slicing
User
Inference
TCSEC
2. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Inference
Data remanence
DOS
Compiler
3. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Transposition
Job rotation
TCP Wrappers
Well-known ports
4. Jumping into dumpsters to retrieve information about someone/something/a company
Sabotage
Dumpster diving
Motion detector
Tort
5. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Compiler
Format 7 times
Script
Multiprocessing
6. Rolling command center with UPS - satellite - uplink - power - etc.
Rolling hot sites
Privacy Act of 1974
Finger printing
Masquerade
7. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Risk Mitigation
Encryption
Risk Acceptance
PKI
8. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
CIRT
TACACS (Terminal access controller access control system)
War driving
Hot Site
9. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Cyphertext only
Detective - Preventive - Corrective
Boot-sector Virus
Caesar Cipher
10. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
Hoax
ActiveX Object Linking and Embedding
Telnet
Hackers
11. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Dumpster diving
Software development lifecycle
MOM
Mandatory vacation
12. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Hubs
ROT-13
CIRT
TCSEC
13. White hat l0pht
Replay
TACACS (Terminal access controller access control system)
Bugtraq
Passive attacks
14. Must be in place for you to use a biometric system
Biometric profile
Inference
Logic bomb
Senior Management
15. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
Teardrop
Firmware
RADIUS (Remote authentication dial-in user service)
Boot-sector Virus
16. More discriminate than dogs
Guards
Logic bomb
Common criteria
CEO
17. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Man trap
Multitasking
AES (Advanced Encryption Standard)
CGI (The Common Gateway Interface)
18. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Compiler
PAP (Password Authentication Protocol)
Polymorphic
Caesar Cipher
19. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Security kernel
Joke
CIA
Aggregation
20. Object Linking and Embedding. The ability of an object to be embedded into another object.
Accountability
Telnet
Packet Sniffing
OLE
21. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Symmetric
Mandatory vacation
Echelon
Brute Force
22. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
ROT-13
OEP
Biometric profile
Worm
23. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Senior Management
Eavesdropping
Fire extinguisher
BIOS
24. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
SQL (Structured Query Language)
l0pht
Repeaters
Checksum
25. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Script kiddies
Attenuation
Audit Trail
Kerberos
26. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Mandatory vacation
Sniffing
Trojan horses
PAP (Password Authentication Protocol)
27. In the broadest sense - a fraud is a deception made for personal gain
Security Perimeter
Fraud
Tailgating / Piggybacking
Logic bomb
28. Occupant Emergency Plan - Employees are the most important!
Risk Transferring
Risk Analysis
Virtual Memory/Pagefile.sys
OEP
29. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Username/password
Cryptanalysis
Biometrics
Inference
30. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
Authorization creep
Separation of duties
WTLS (Wireless Transport Layer Security)
Replay
31. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Cold Site
Toneloc
ROT-13
Dictionary Attack
32. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Accreditation
Promiscuous mode
Active attacks
Throughput of a Biometric System
33. A network that mimics the brain
Classes of IP networks
OSI Model
Warm Site
Artificial Neural Networks (ANN)
34. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Throughput of a Biometric System
Covert channels
Reciprocal agreement
AES (Advanced Encryption Standard)
35. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Rijndael
Echelon
Trap Door
Smart cards
36. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
COM
Burden of Proof
Security Perimeter
Entrapment
37. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Smurf
Dictionary Attack
Security Awareness Training
Throughput of a Biometric System
38. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Cookies
ROM (Read-only memory)
User
Hot Site
39. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
Toneloc
Bastion hosts
Callback Security/Call Forwarding
SSH
40. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
Hot Site
Spoofing
COM
Carnivore
41. Closed Circuit Television
Open network
OSI Model
CCTV
l0pht
42. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Coax
Clipping levels
IAB
Warm Site
43. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Noise & perturbation
Hot Site
Honey pot
Hardware
44. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Macro
Java
ActiveX Object Linking and Embedding
Polymorphic
45. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
ROT-13
Polymorphic
VLANs
l0pht
46. Method of authenticating to a system. Something that you supply and something you know.
VPN (Virtual Private Network)
SQL (Structured Query Language)
Username/password
ARO (Annualized Rate of Occurrence)
47. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Aggregation
War driving
Telnet
DOS
48. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
Well-known ports
Hot Site
Wiretapping
Polymorphic
49. A mechanism by which connections to TCP services on a system are allowed or disallowed
Carnivore
Software
TCP Wrappers
War dialing
50. These can be used to verify that public keys belong to certain individuals.
Smurf
Encryption
Digital certificates
Fraud
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests