SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Internet Architecture Board. This board is responsible for protecting the Internet.
IAB
CGI (The Common Gateway Interface)
Dumpster diving
Data remanence
2. Disclosure - Alteration - Destruction. These things break the CIA triad
Illegal/Unethical
DAD
Boot-sector Virus
Burden of Proof
3. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Firewall types
Due Care
Raid 0 - 1 - 3 - 5
Hubs
4. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Cyphertext only
Firewall types
Rolling hot sites
Smurf
5. A site that has some equipment in place - and can be up within days
Echelon
Telnet
Scanning
Warm Site
6. Threat to physical security.
Sniffing
Sabotage
Service packs
Authorization creep
7. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Security kernel
Classes of IP networks
Nonce
Cryptanalysis
8. Network Address Translation
TCSEC
Risk Transferring
NAT
War dialing
9. A network that uses standard protocols (TCP/IP)
Macro
Open network
Object Oriented Programming
Non-repudiation
10. Occupant Emergency Plan - Employees are the most important!
Toneloc
Base-64
Classes of IP networks
OEP
11. Be at least 8 foot tall and have three strands of barbed wire.
Authorization
Digest
Fences
CIO
12. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
SSH
Biometric profile
Joke
TACACS (Terminal access controller access control system)
13. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
ROT-13
Security Perimeter
VLANs
Clipping levels
14. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Decentralized
Hoax
Encryption
Due Diligence
15. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
BIA
RADIUS (Remote authentication dial-in user service)
UUEncode
ARP (Address Resolution Protocol)
16. Access control method for database based on the content of the database to provide granular access
Telnet
Content dependant
Expert systems
Private Addressing
17. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Hot Site
Privacy Act of 1974
/etc/passwd
Joke
18. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Digital certificates
Fences
Sniffing
Tailgating / Piggybacking
19. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
Out of band
Boot-sector Virus
MitM
Service packs
20. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Granularity
Data Mart
Digital signing
Tort
21. In cryptography - it is a block cipher
Embezzlement
Hardware
Cookies
Skipjack
22. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Skipjack
Authentication
Hardware
AES (Advanced Encryption Standard)
23. Network devices that operate at layer 3. This device separates broadcast domains.
FAR/FRR/CER
Routers
Buffer overflow
Dictionary Attack
24. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Embezzlement
Degausser
Object Oriented Programming
Raid 0 - 1 - 3 - 5
25. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Block cipher
Covert channels
Security Awareness Training
Finger printing
26. A RFC standard. A mechanism for performing commands on a remote system
Authorization creep
Authentication
Telnet
Security kernel
27. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
OSI Model
CD-Rom
WTLS (Wireless Transport Layer Security)
VPN (Virtual Private Network)
28. When security is managed at many different points in an organization
Coax
Throughput of a Biometric System
Decentralized
Packet Sniffing
29. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Crosstalk
Transposition
Trade Secret
Java
30. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Technical - Administrative - Physical
Worm
Mandatory vacation
Identification
31. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Warm Site
Security through obscurity
Data Mart
Caesar Cipher
32. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Salami Slicing
Packet Sniffing
UUEncode
Identification
33. Defines the objects and their attributes that exist in a database.
Schema
Asymmetric
ARP (Address Resolution Protocol)
Back door/ trap door/maintenance hook
34. Accepting all packets
Substitution
Promiscuous mode
Sniffing
Twisted pair
35. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Virtual machine
Incentive programs
Brute Force
Exit interview
36. Good for distance - longer than 100M
Normalization
SESAME
Coax
NAT
37. An instance of a scripting language
BIOS
Script
Username/password
COM
38. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Patent
Packet Sniffing
Biometric profile
Twisted pair
39. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Certification
DCOM
CD-Rom
UUEncode
40. The person that determines the permissions to files. The data owner.
NAT
Checksum
Decentralized
Owner
41. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Data Mart
Telnet
Acceptable use
SQL (Structured Query Language)
42. When two or more processes are linked and execute multiple programs simultaneously
Multiprocessing
Probing
BIA
Qualitative
43. Encompasses Risk Analysis and Risk Mitigation
Finger scanning
SQL (Structured Query Language)
Vulnerability analysis tools
Risk Management
44. To not be legal (as far as law is concerned) or ethical
Illegal/Unethical
Security kernel
Software development lifecycle
DNS cache poisoning
45. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Risk Management
Switches / Bridges
DHCP
Security kernel
46. Closed Circuit Television
CCTV
SESAME
Spoofing
Trap Door
47. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
CD-Rom
Masquerade
Username/password
SSH
48. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Data remanence
Username/password
Expert System
CHAP
49. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Substitution
AES (Advanced Encryption Standard)
Artificial Neural Networks (ANN)
Diffie-Hellman
50. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Data Mart
SSL/TLS
Content dependant
Virtual machine
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests