SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Trademark
Security Awareness Training
Honey pot
SESAME
2. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
Cyphertext only
Packet Sniffing
Macro
SSH
3. The practice of obtaining confidential information by manipulation of legitimate users.
Social engineering
Phreaker
Promiscuous mode
Risk Mitigation
4. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Logic bomb
COM
Patriot Act
Joke
5. Network devices that operate at layer 3. This device separates broadcast domains.
DDOS
Base-64
Routers
VLANs
6. Rolling command center with UPS - satellite - uplink - power - etc.
Reciprocal agreement
Patriot Act
CHAP
Rolling hot sites
7. Scanning the airwaves for radio transmissions
COM
Wiretapping
UUEncode
Scanning
8. A military standard defining controls for emanation protection
Audit Trail
Patent
Incentive programs
TEMPEST
9. Common Object Request Broker Architecture.
Schema
Brute force
Base-64
CORBA
10. The idea is that a computer program may be seen as comprising a collection of individual units - or objects - that act on each other - as opposed to a traditional view in which a program may be seen as a collection of functions - or simply as a list
Risk Mitigation
Closed network
Object Oriented Programming
Brewer-Nash model
11. Public Key Infrastructure
PKI
CHAP
Code of ethics
Clipping levels
12. Chief Executive Officer
Format 7 times
CD-Rom
Checksum
CEO
13. Dynamic Host Configuration Protocol.
DHCP
Noise & perturbation
BIOS
Two-Factor Authentication
14. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Expert System
PKI
Eavesdropping
AES (Advanced Encryption Standard)
15. Making individuals accountable for their actions on a system typically through the use of auditing
Brute Force
Patent
TACACS (Terminal access controller access control system)
Accountability
16. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
PKI
Polymorphism
Illegal/Unethical
Software development lifecycle
17. Using ICMP to diagram a network
ARO (Annualized Rate of Occurrence)
Script
Probing
Smart cards
18. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Polymorphism
Boot-sector Virus
Identification
DMZ
19. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Birthday attack
Illegal/Unethical
Throughput of a Biometric System
TEMPEST
20. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
Attenuation
SQL (Structured Query Language)
War dialing
Risk Mitigation
21. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Substitution
CORBA
TCSEC
Firmware
22. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Rolling hot sites
Attenuation
Security kernel
Fiber optic
23. Component Object Model.
Hearsay Evidence
COM
Rijndael
Debug
24. Also known as a tunnel)
Risk Management
Smart cards
ARO (Annualized Rate of Occurrence)
VPN (Virtual Private Network)
25. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Embezzlement
Rolling hot sites
Scanning
Substitution
26. A compact disc that contains data only accessible by a computer. All modern CD-ROM drives can also read audio CDs. It is possible to produce composite CDs containing both data and audio with the latter capable of being played on a CD player - whilst
PKI
CD-Rom
Mandatory vacation
Man trap
27. A technique to eliminate data redundancy.
Finger printing
Risk Mitigation
Normalization
COM
28. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Mandatory vacation
Data remanence
Call tree
Multiprocessing
29. A gas used in fire suppression. Not human safe. Chemical reaction.
Artificial Neural Networks (ANN)
Due Care
Halon
Two-Factor Authentication
30. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Digest
Software librarian
Replay
Hearsay Evidence
31. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
Authorization
Base-64
Two-Factor Authentication
Tort
32. Good for distance - longer than 100M
Accreditation
Coax
Private Addressing
Passive attacks
33. Basic Input/Output System
BIOS
DAD
Non-repudiation
Penetration testing
34. Personal - Network - and Application
Firewall types
Closed network
Common criteria
Finger printing
35. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Guards
Hackers
Transposition
Artificial Neural Networks (ANN)
36. The output of a hash function is a digest.
Coax
Compiler
Data remanence
Digest
37. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
ARP (Address Resolution Protocol)
MOM
Salami Slicing
Content dependant
38. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Classes of IP networks
Symmetric
Dogs
Change management
39. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Trademark
Patent
Cryptanalysis
Enticement
40. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Masquerade
Logic bomb
/etc/passwd
Due Diligence
41. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
OSI Model
DMZ
Compiler
Skipjack
42. White hat l0pht
Bugtraq
Penetration testing
Trademark
Normalization
43. A denial-of-service attack is an attack on a computer system or network that causes a loss of service to users - typically the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational
Quantitative
DOS
Smurf
Trade Secret
44. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
TACACS (Terminal access controller access control system)
Honey pot
Hackers
Throughput of a Biometric System
45. Continuation of Operations Plan
Rolling hot sites
COOP
Hearsay Evidence
Dogs
46. A network that uses proprietary protocols
Attenuation
Substitution
Closed network
Qualitative
47. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
Vulnerability analysis tools
Substitution
Checksum
Brewer-Nash model
48. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Owner
Software
Normalization
ARP (Address Resolution Protocol)
49. Must be in place for you to use a biometric system
Brewer-Nash model
/etc/passwd
Brute force
Biometric profile
50. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Switches / Bridges
Entrapment
Patriot Act
Finger scanning
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests