SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
PAP (Password Authentication Protocol)
Mandatory vacation
Covert channels
Exit interview
2. Scanning the airwaves for radio transmissions
Scanning
Asymmetric
Malware
EF (Exposure Factor)
3. This is an open international standard for applications that use wireless communications.
WAP (Wireless Application Protocol)
Security kernel
Classes of IP networks
Clipper Chip
4. Dialing fixed sets telephone numbers looking for open modem connections to machines
War dialing
Switches / Bridges
RADIUS (Remote authentication dial-in user service)
Expert systems
5. The art of breaking code. Testing the strength of an algorithm.
IRC
Cryptanalysis
OSI Model
CEO
6. Chief Executive Officer
Fraggle
CEO
Cyphertext only
Active attacks
7. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Rolling hot sites
Multipartite
Base-64
DCOM
8. White hat l0pht
Security kernel
Teardrop
Bugtraq
Promiscuous mode
9. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
OSI Model
Accountability
Routers
TACACS (Terminal access controller access control system)
10. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Script kiddies
OLE
Closed network
Birthday attack
11. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Virtual Memory/Pagefile.sys
Script kiddies
Enticement
Private Addressing
12. After implementing countermeasures - accepting risk for the amount of vulnerability left over
CIA
Risk Acceptance
Normalization
Boot-sector Virus
13. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Brute Force
Hash
Quality Assurance
TCB
14. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
ActiveX Object Linking and Embedding
Callback Security/Call Forwarding
Birthday attack
Certification
15. Common Object Request Broker Architecture.
Decentralized
CORBA
Coax
Normalization
16. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Hacker
SQL (Structured Query Language)
Hardware
Hearsay Evidence
17. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
AES (Advanced Encryption Standard)
Content dependant
DNS cache poisoning
/etc/passwd
18. Encompasses Risk Analysis and Risk Mitigation
SESAME
Back door/ trap door/maintenance hook
Fences
Risk Management
19. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Software development lifecycle
Clipping levels
Authorization creep
Security through obscurity
20. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Change management
Common criteria
Mandatory vacation
Twisted pair
21. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
Attenuation
Centralized
Spoofing
Logic bomb
22. More discriminate than dogs
Substitution
Firmware
Guards
COOP
23. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Hot Site
Switches / Bridges
Sniffing
Two-Factor Authentication
24. A meme and a joke are the same thing. e.g. When someone says to delete a file that is really just fine and they call it a virus
Joke
Guards
Embezzlement
Fiber optic
25. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Hubs
Hot Site
Asset Value
Authorization
26. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
Caesar Cipher
BIA
Carnivore
Certification
27. The process of reducing your risks to an acceptable level based on your risk analysis
Out of band
Biometric profile
Risk Mitigation
Schema
28. Public Key Infrastructure
Identification
PKI
SESAME
Expert systems
29. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Fraggle
VPN (Virtual Private Network)
Caesar Cipher
Expert systems
30. To not be legal (as far as law is concerned) or ethical
Hardware
Man trap
Raid 0 - 1 - 3 - 5
Illegal/Unethical
31. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Brewer-Nash model
Virtual machine
Burden of Proof
Quantitative
32. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Termination procedures
Risk Acceptance
Data remanence
SESAME
33. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Hash
Data Mart
Risk Management
Sniffing
34. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Multiprocessing
Salami Slicing
Qualitative
Fire extinguisher
35. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
Entrapment
War driving
Kerberos
Classes of IP networks
36. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
ROM (Read-only memory)
CRC (Cyclic Redundancy Check)
ActiveX Object Linking and Embedding
SSL/TLS
37. A network entity that provides a single entrance / exit point to the Internet.
Bastion hosts
Mandatory vacation
Brute Force
Dogs
38. An automated tool with a database of known vulnerabilities that check systems for those vulnerabilities
Mandatory vacation
Vulnerability analysis tools
Qualitative
Common criteria
39. The practice of following someone with a security code or keycard through a security door - generally in workplaces.
NAT
EF (Exposure Factor)
Tailgating / Piggybacking
Brewer-Nash model
40. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Brute force
/etc/passwd
Smart cards
Macro
41. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Risk Mitigation
Hearsay Evidence
Two-Factor Authentication
IRC
42. When one key of a two-key pair has more encryption pattern than the other
Asymmetric
Virtual machine
MitM
ARP (Address Resolution Protocol)
43. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Debug
Session Hijacking
Firmware
Checksum
44. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
ALE (Annualized Loss Expectancy)
Penetration testing
Software development lifecycle
War driving
45. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Coax
Out of band
Caesar Cipher
IAB
46. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Bugtraq
Trap Door
Clipping levels
Hearsay Evidence
47. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Diffie-Hellman
CCTV
Java
Mandatory vacation
48. Method of authenticating to a system. Something that you supply and something you know.
Digital signing
Username/password
Object Oriented Programming
Stream cipher
49. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
Replay
Hackers
Birthday attack
Multipartite
50. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Smart cards
Noise & perturbation
Covert channels
Skipjack
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests