SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
Spoofing
Cryptanalysis
SSH
Patriot Act
2. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
EF (Exposure Factor)
Polymorphism
Nonce
Trojan horses
3. Must be in place for you to use a biometric system
Dogs
Security kernel
Biometric profile
Eavesdropping
4. A site that has some equipment in place - and can be up within days
Warm Site
Tokens
Hacker
Acceptable use
5. Confidentiality - Integrity - and Availability
CIA
Motion detector
Rijndael
Digital signing
6. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
Firewall types
SLE (Single Loss Expectancy or Exposure)
Change management
TACACS (Terminal access controller access control system)
7. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Debug
Clipper Chip
Wiretapping
Aggregation
8. Good for distance - longer than 100M
Software
Coax
SQL (Structured Query Language)
Clipping levels
9. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
EF (Exposure Factor)
BIA
Accountability
SSO (Single sign-on)
10. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Object Oriented Programming
Carnivore
Throughput of a Biometric System
Granularity
11. Enticing people to hit your honeypot to see how they try to access your system.
Exit interview
Aggregation
Audit Trail
Enticement
12. Encompasses Risk Analysis and Risk Mitigation
Twisted pair
BIOS
Risk Management
Birthday attack
13. Involving the measurement of quantity or amount.
Substitution
CRC (Cyclic Redundancy Check)
Quantitative
Checksum
14. The person that determines the permissions to files. The data owner.
Owner
Hacker
Java
Risk Acceptance
15. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
CEO
VLANs
Hackers
Bugtraq
16. A hidden communications channel on a system that allows for the bypassing of the system security policy
Crosstalk
Virtual machine
Covert channels
Telnet
17. A system designed to stop piggybacking.
Kerberos
Man trap
Software
AES (Advanced Encryption Standard)
18. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Software librarian
War dialing
Teardrop
Malware
19. In cryptography - it is a block cipher
OEP
Sabotage
Skipjack
Twisted pair
20. Basic Input/Output System
Data remanence
WTLS (Wireless Transport Layer Security)
BIOS
Skipjack
21. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
TACACS (Terminal access controller access control system)
Logic bomb
Virtual Memory/Pagefile.sys
Carnivore
22. A collection of updates - fixes and/or enhancements to a software program delivered in the form of a single installable package.
RADIUS (Remote authentication dial-in user service)
Service packs
Hardware
DNS cache poisoning
23. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Raid 0 - 1 - 3 - 5
Social engineering
DOS
Noise & perturbation
24. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
Digital certificates
Security through obscurity
Nonce
CD-Rom
25. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Smart cards
OLE
Virtual Memory/Pagefile.sys
CEO
26. A gas used in fire suppression. Not human safe. Chemical reaction.
Halon
Incentive programs
Script kiddies
Detective - Preventive - Corrective
27. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Base-64
Format 7 times
Private Addressing
CD-Rom
28. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Phreaker
Audit Trail
FAR/FRR/CER
Security Awareness Training
29. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
DOS
Callback Security/Call Forwarding
Fences
OSI Model
30. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Expert System
Clipper Chip
Change management
Hot Site
31. Relating to quality or kind. This assigns a level of importance to something.
RAM (Random-access memory)
Data remanence
Tort
Qualitative
32. White hat l0pht
Joke
Bugtraq
Polymorphism
Reciprocal agreement
33. To not be legal (as far as law is concerned) or ethical
CRC (Cyclic Redundancy Check)
Base-64
Illegal/Unethical
PKI
34. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Social engineering
Mandatory vacation
Birthday attack
Software development lifecycle
35. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Tort
Hoax
Cookies
Decentralized
36. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Two-Factor Authentication
UUEncode
Routers
Biometrics
37. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Diffie-Hellman
Termination procedures
Rolling hot sites
Virtual Memory/Pagefile.sys
38. The output of a hash function is a digest.
Schema
Content dependant
Digest
Expert systems
39. Also known as a tunnel)
VPN (Virtual Private Network)
Call tree
Granularity
CIO
40. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Data remanence
Boot-sector Virus
Two-Factor Authentication
Routers
41. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Embezzlement
Teardrop
Sniffing
VPN (Virtual Private Network)
42. Providing verification to a system
Artificial Neural Networks (ANN)
Session Hijacking
Authentication
Security through obscurity
43. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
TCB
Smart cards
Callback Security/Call Forwarding
Dictionary Attack
44. Emanations from one wire coupling with another wire
Twisted pair
Dumpster diving
Sniffing
Crosstalk
45. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Risk Acceptance
Artificial Neural Networks (ANN)
Software
AES (Advanced Encryption Standard)
46. A network that uses proprietary protocols
Tokens
Malware
Closed network
Incentive programs
47. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
SSL/TLS
Block cipher
Rijndael
Telnet
48. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Format 7 times
Virtual Memory/Pagefile.sys
ROT-13
Artificial Neural Networks (ANN)
49. Chief Executive Officer
Covert channels
UUEncode
DNS cache poisoning
CEO
50. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Due Diligence
Packet Sniffing
Masquerade
UUEncode
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests