SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
SESAME
Privacy Act of 1974
Due Care
CGI (The Common Gateway Interface)
2. An instance of a scripting language
Enticement
Script
CIO
Key Escrow
3. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
TCSEC
Code of ethics
IAB
Firewall types
4. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
DDOS
Patent
Acceptable use
Trojan horses
5. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Boot-sector Virus
Smart cards
Detective - Preventive - Corrective
Inference
6. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Code of ethics
Decentralized
Asset Value
Data Mart
7. The process of reducing your risks to an acceptable level based on your risk analysis
Data Mart
Classes of IP networks
Risk Mitigation
Illegal/Unethical
8. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Social engineering
Qualitative
Virtual Memory/Pagefile.sys
Macro
9. A unit that will detect motion for the purpose of setting of the alarms to alert for unauthorized access.
UUEncode
Granularity
Motion detector
Smurf
10. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Fiber optic
Symmetric
Job rotation
Stream cipher
11. In cryptography - it is a block cipher
Encryption
Halon
Clipping levels
Skipjack
12. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Transposition
Out of band
Script
Job rotation
13. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
SSH
Base-64
Birthday attack
NAT
14. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Active attacks
Debug
FAR/FRR/CER
Echelon
15. Accepting all packets
VPN (Virtual Private Network)
Promiscuous mode
Digital signing
ARP (Address Resolution Protocol)
16. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Fences
Brute force
Acceptable use
BIA
17. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Technical - Administrative - Physical
ARP (Address Resolution Protocol)
Toneloc
Termination procedures
18. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Granularity
Twisted pair
Hardware
Aggregation
19. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Security Awareness Training
UUEncode
Entrapment
Script kiddies
20. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Warm Site
Certification
Hearsay Evidence
Smurf
21. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Service packs
Penetration testing
Salami Slicing
Separation of duties
22. Chief Executive Officer
Audit Trail
CEO
CCTV
Privacy Act of 1974
23. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Masquerade
SQL (Structured Query Language)
Promiscuous mode
Qualitative
24. Relating to quality or kind. This assigns a level of importance to something.
Qualitative
FAR/FRR/CER
DOS
Script
25. Transferring your risk to someone else - typically an insurance company
Risk Transferring
Polymorphism
Biometric profile
Fences
26. Dynamic Host Configuration Protocol.
Schema
Digest
Out of band
DHCP
27. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Hubs
Security kernel
Senior Management
SYN Flood
28. A hidden communications channel on a system that allows for the bypassing of the system security policy
Crosstalk
Covert channels
Diffie-Hellman
Virtual machine
29. The practice of obtaining confidential information by manipulation of legitimate users.
SQL (Structured Query Language)
Risk Management
Coax
Social engineering
30. Network device that operates at layer 1. Concentrator.
l0pht
DDOS
UUEncode
Hubs
31. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
Burden of Proof
Worm
Man trap
VLANs
32. Network Address Translation
Symmetric
Hackers
Code of ethics
NAT
33. A system designed to stop piggybacking.
Tort
Exit interview
Man trap
CD-Rom
34. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Rijndael
Throughput of a Biometric System
BIOS
IRC
35. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Honey pot
Authentication
Data remanence
Security kernel
36. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Noise & perturbation
CIA
Hoax
Trademark
37. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
FAR/FRR/CER
Raid 0 - 1 - 3 - 5
TCP Wrappers
Normalization
38. This is an open international standard for applications that use wireless communications.
Fiber optic
Risk Mitigation
Content dependant
WAP (Wireless Application Protocol)
39. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Script kiddies
Non-repudiation
Code of ethics
DOS
40. Closed Circuit Television
RAM (Random-access memory)
COOP
CIA
CCTV
41. a.k.a. The Chinese wall. Nash Bridges - Bridge wall - Chinese wall. Dynamically changes access control to prevent unauthorized access.
Accreditation
Brewer-Nash model
Data Mart
Raid 0 - 1 - 3 - 5
42. Encompasses Risk Analysis and Risk Mitigation
Probing
Hacker
Patent
Risk Management
43. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Software development lifecycle
Smurf
DMZ
Expert systems
44. The art of breaking code. Testing the strength of an algorithm.
Hardware
Cryptanalysis
Substitution
Finger scanning
45. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
NAT
Expert systems
Hacker
Dictionary Attack
46. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Firewall types
Certification
Senior Management
Carnivore
47. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
War dialing
Fraggle
ActiveX Object Linking and Embedding
Macro
48. Confidentiality - Integrity - and Availability
Burden of Proof
TCSEC
CIA
Session Hijacking
49. Access control method for database based on the content of the database to provide granular access
UUEncode
Burden of Proof
Content dependant
Promiscuous mode
50. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Well-known ports
Trojan horses
Throughput of a Biometric System
Rolling hot sites
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests