SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The intercepting of conversations by unintended recipients
Granularity
Eavesdropping
Security Awareness Training
COOP
2. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
Risk Mitigation
BIA
Debug
Service packs
3. Assuming someone's session who is unaware of what you are doing
Software development lifecycle
Session Hijacking
Brute force
Out of band
4. When a security event occurs - this is the order in which people will be contacted. This is a predefined list.
Classes of IP networks
Birthday attack
Call tree
EF (Exposure Factor)
5. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Nonce
Job rotation
Raid 0 - 1 - 3 - 5
Dumpster diving
6. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
SSL/TLS
Change management
Job rotation
Buffer overflow
7. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Digital signing
Security kernel
l0pht
OSI Model
8. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Authorization
Sniffing
Passive attacks
Honey pot
9. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
AES (Advanced Encryption Standard)
Risk Acceptance
Digital certificates
Brewer-Nash model
10. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Hash
Fences
Due Care
OLE
11. Defines the objects and their attributes that exist in a database.
Schema
PKI
Hash
SYN Flood
12. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Non-repudiation
Replay
Aggregation
PKI
13. The output of a hash function is a digest.
Bugtraq
Detective - Preventive - Corrective
Decentralized
Digest
14. A site that has some equipment in place - and can be up within days
Digital signing
Penetration testing
Accreditation
Warm Site
15. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
AES (Advanced Encryption Standard)
DNS cache poisoning
Base-64
Multiprocessing
16. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
Security Perimeter
Diffie-Hellman
CD-Rom
Substitution
17. Be at least 8 foot tall and have three strands of barbed wire.
Due Care
CD-Rom
DAD
Fences
18. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
IRC
Key Escrow
SYN Flood
DOS
19. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Symmetric
Scanning
Birthday attack
Brute Force
20. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
Rolling hot sites
ActiveX Object Linking and Embedding
Fences
Eavesdropping
21. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Trap Door
Logic bomb
AES (Advanced Encryption Standard)
Exit interview
22. Must be in place for you to use a biometric system
Probing
Granularity
Masquerade
Biometric profile
23. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Hacker
Java
Detective - Preventive - Corrective
Termination procedures
24. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Teardrop
Clipping levels
Motion detector
Salami Slicing
25. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Switches / Bridges
Risk Management
Raid 0 - 1 - 3 - 5
Encryption
26. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Format 7 times
Termination procedures
SSL/TLS
Routers
27. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Penetration testing
Change management
Diffie-Hellman
Base-64
28. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Warm Site
PAP (Password Authentication Protocol)
ARP (Address Resolution Protocol)
Expert System
29. Internet Architecture Board. This board is responsible for protecting the Internet.
Logic bomb
AES (Advanced Encryption Standard)
Acceptable use
IAB
30. Object Linking and Embedding. The ability of an object to be embedded into another object.
Two-Factor Authentication
Telnet
OLE
Rijndael
31. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Polymorphic
Sabotage
Honey pot
Compiler
32. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
ROM (Read-only memory)
Macro
WTLS (Wireless Transport Layer Security)
Risk Transferring
33. Basic Input/Output System
Malware
Quantitative
ROT-13
BIOS
34. A site that is ready physically but has no hardware in place - all it has is HVAC
Software librarian
Cold Site
Termination procedures
Biometric profile
35. An attempt to trick the system into believing that something false is real
Hoax
Common criteria
Crosstalk
Salami Slicing
36. Random Number Base
Scanning
Nonce
Attenuation
Mandatory vacation
37. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Hubs
Digital signing
TEMPEST
DHCP
38. A system designed to stop piggybacking.
Service packs
Man trap
Spoofing
CD-Rom
39. Encompasses Risk Analysis and Risk Mitigation
Data remanence
Owner
Risk Management
Senior Management
40. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Schema
TEMPEST
Brute force
Caesar Cipher
41. Setting up the user to access the honeypot for reasons other than the intent to harm.
Symmetric
Social engineering
TEMPEST
Entrapment
42. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Hearsay Evidence
Well-known ports
OEP
Checksum
43. When security is managed at many different points in an organization
Man trap
Bugtraq
Session Hijacking
Decentralized
44. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
MOM
Due Diligence
PAP (Password Authentication Protocol)
Nonce
45. Emanations from one wire coupling with another wire
Patent
Finger scanning
Crosstalk
RAM (Random-access memory)
46. A network that uses proprietary protocols
Authorization
COOP
Closed network
SSO (Single sign-on)
47. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Cyphertext only
UUEncode
ROT-13
Illegal/Unethical
48. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
CORBA
Due Care
Active attacks
Copyright
49. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Script kiddies
Sabotage
Switches / Bridges
Logic bomb
50. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
DNS cache poisoning
Script kiddies
Security Awareness Training
ARP (Address Resolution Protocol)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests