SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
Privacy Act of 1974
Toneloc
Fences
SYN Flood
2. A technique to eliminate data redundancy.
Inference
Social engineering
Switches / Bridges
Normalization
3. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Hackers
AES (Advanced Encryption Standard)
Key Escrow
Risk Mitigation
4. This is an open international standard for applications that use wireless communications.
Data Mart
Accountability
Biometrics
WAP (Wireless Application Protocol)
5. Once authenticated - the level of access you have to a system
Risk Management
Normalization
Authorization
Spoofing
6. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
Kerberos
OSI Model
Carnivore
TACACS (Terminal access controller access control system)
7. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Inference
Motion detector
Key Escrow
Job rotation
8. Good for distance - longer than 100M
CCTV
Coax
Promiscuous mode
Toneloc
9. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Two-Factor Authentication
Authentication
SYN Flood
IAB
10. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Finger scanning
Risk Analysis
Repeaters
Smart cards
11. Also civil law
EF (Exposure Factor)
DDOS
Tort
Hardware
12. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
DMZ
AES (Advanced Encryption Standard)
DNS cache poisoning
SSO (Single sign-on)
13. The art of breaking code. Testing the strength of an algorithm.
Active attacks
Cryptanalysis
ARO (Annualized Rate of Occurrence)
Switches / Bridges
14. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Hubs
Risk Acceptance
VPN (Virtual Private Network)
Senior Management
15. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Motion detector
Software
Honey pot
/etc/passwd
16. A hidden communications channel on a system that allows for the bypassing of the system security policy
Schema
Block cipher
Expert systems
Covert channels
17. Someone whose hacking is primarily targeted at the phone systems
Symmetric
Phreaker
DNS cache poisoning
EF (Exposure Factor)
18. Enticing people to hit your honeypot to see how they try to access your system.
Dogs
Enticement
CHAP
MOM
19. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Code of ethics
Trojan horses
PAP (Password Authentication Protocol)
Hardware
20. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
COOP
Trade Secret
ROM (Read-only memory)
Multiprocessing
21. The person that controls access to the data
Skipjack
PKI
Custodian
Cryptanalysis
22. The frequency with which a threat is expected to occur.
Caesar Cipher
Probing
ARO (Annualized Rate of Occurrence)
Trojan horses
23. Chief Information Officer
Certification
Schema
CIO
Security through obscurity
24. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Boot-sector Virus
Smart cards
Caesar Cipher
ActiveX Object Linking and Embedding
25. Also known as a tunnel)
VPN (Virtual Private Network)
Biometric profile
Fire extinguisher
COOP
26. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Digital signing
CRC (Cyclic Redundancy Check)
RADIUS (Remote authentication dial-in user service)
Termination procedures
27. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
Compiler
Two-Factor Authentication
Digital certificates
DMZ
28. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
DHCP
Echelon
ALE (Annualized Loss Expectancy)
Carnivore
29. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Authorization creep
SSL/TLS
Custodian
AES (Advanced Encryption Standard)
30. An organization that got their fame from telling the Senate Judiciary Committee that they could bring down the Internet in 30 minutes. Black hat....
l0pht
Sniffing
Motion detector
User
31. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Audit Trail
Non-repudiation
Technical - Administrative - Physical
DOS
32. Closed Circuit Television
Script
DCOM
Service packs
CCTV
33. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
CORBA
MOM
SYN Flood
34. Someone who hacks
Accreditation
Hacker
DCOM
UUEncode
35. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
War driving
Expert systems
Quantitative
Due Care
36. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Acceptable use
Honey pot
Accountability
Finger scanning
37. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Buffer overflow
Logic bomb
Eavesdropping
Covert channels
38. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Biometrics
Covert channels
ROM (Read-only memory)
Sniffing
39. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
Finger scanning
Compiler
SSH
CCTV
40. Method of authenticating to a system. Something that you supply and something you know.
Back door/ trap door/maintenance hook
ISDN (Integrated Services Digital Network)
Username/password
Warm Site
41. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Tokens
Asset Value
Polymorphism
SESAME
42. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
Accountability
Kerberos
Security through obscurity
Crosstalk
43. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
Cookies
ALE (Annualized Loss Expectancy)
CHAP
Tort
44. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Halon
Artificial Neural Networks (ANN)
DAD
Java
45. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Toneloc
Penetration testing
Risk Acceptance
CHAP
46. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Honey pot
Artificial Neural Networks (ANN)
Security kernel
Biometric profile
47. Something used to put out a fire. Can be in Classes A - B - C - D - or H
ARP (Address Resolution Protocol)
Firewall types
Fire extinguisher
DHCP
48. To not be legal (as far as law is concerned) or ethical
Illegal/Unethical
Authentication
Callback Security/Call Forwarding
Digest
49. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Data Mart
Probing
Service packs
CHAP
50. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Security kernel
Detective - Preventive - Corrective
Virtual machine
Reciprocal agreement