SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Someone whose hacking is primarily targeted at the phone systems
Phreaker
Code of ethics
Out of band
BIA
2. When security is managed at many different points in an organization
Decentralized
SYN Flood
Security Perimeter
Hash
3. The frequency with which a threat is expected to occur.
ARO (Annualized Rate of Occurrence)
Rolling hot sites
Hackers
OLE
4. To not be legal (as far as law is concerned) or ethical
Honey pot
Illegal/Unethical
Echelon
SYN Flood
5. Motivational tools for employee awareness to get them to report security flaws in an organization
SSL/TLS
ROT-13
Incentive programs
Termination procedures
6. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
TCSEC
Carnivore
COM
Scanning
7. Signal degradation as it moves farther from its source
CEO
Normalization
Coax
Attenuation
8. A technique to eliminate data redundancy.
Normalization
/etc/passwd
DOS
Trap Door
9. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Symmetric
Cookies
Dictionary Attack
Clipper Chip
10. Accepting all packets
Telnet
Hash
Brewer-Nash model
Promiscuous mode
11. Providing verification to a system
Authentication
MitM
Trade Secret
Biometrics
12. Something used to put out a fire. Can be in Classes A - B - C - D - or H
Fire extinguisher
Acceptable use
MitM
Classes of IP networks
13. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Bastion hosts
MitM
Software librarian
Carnivore
14. A gas used in fire suppression. Not human safe. Chemical reaction.
Halon
Risk Management
Authorization creep
Crosstalk
15. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Firewall types
Switches / Bridges
Hearsay Evidence
Entrapment
16. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Asset Value
Burden of Proof
Multithreading
Private Addressing
17. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Eavesdropping
Embezzlement
Man trap
Call tree
18. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Classes of IP networks
Risk Analysis
Open network
Probing
19. Telephone tapping (or wire tapping/wiretapping in the US) is the monitoring of telephone and Internet conversations by a third party - often by covert means. The telephone tap or wire tap received its name because historically - the monitoring connec
Brute force
Telnet
Dumpster diving
Wiretapping
20. A military standard defining controls for emanation protection
TEMPEST
Asymmetric
Trade Secret
RAM (Random-access memory)
21. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Risk Management
Finger scanning
Debug
Granularity
22. A network entity that provides a single entrance / exit point to the Internet.
Bastion hosts
Termination procedures
Virtual machine
Boot-sector Virus
23. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
DHCP
Out of band
Checksum
Polymorphic
24. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Clipper Chip
Caesar Cipher
CD-Rom
User
25. The practice of obtaining confidential information by manipulation of legitimate users.
Authorization creep
Security Awareness Training
Spoofing
Social engineering
26. Distributed Component Object Model. Microsoft's implementation of CORBA.
Audit Trail
DCOM
Privacy Act of 1974
Java
27. Software designed to infiltrate or damage a computer system - without the owner's consent.
Authorization creep
Tort
Malware
Honey pot
28. An AAA (Authentication - Authorization - and Accounting) protocol for applications such as network access or IP mobility. It is intended to work in both local and roaming situations.
RADIUS (Remote authentication dial-in user service)
Service packs
Wiretapping
Decentralized
29. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Trojan horses
Due Care
Biometrics
NAT
30. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Coax
Polymorphism
Trap Door
Change management
31. Network device that operates at layer 1. Concentrator.
Active attacks
Multitasking
Smurf
Hubs
32. Good for distance - longer than 100M
Coax
/etc/passwd
Raid 0 - 1 - 3 - 5
Accreditation
33. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Diffie-Hellman
Qualitative
Base-64
AES (Advanced Encryption Standard)
34. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
Termination procedures
SYN Flood
Active attacks
Hacker
35. The process of reducing your risks to an acceptable level based on your risk analysis
TCB
Fraud
Risk Mitigation
Entrapment
36. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
ALE (Annualized Loss Expectancy)
Boot-sector Virus
COOP
Substitution
37. Public Key Infrastructure
PKI
Separation of duties
Echelon
ALE (Annualized Loss Expectancy)
38. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Tort
Enticement
Trade Secret
Hearsay Evidence
39. More discriminate than dogs
Covert channels
Dictionary Attack
BIA
Guards
40. A war dialing utility
TCSEC
CIRT
Quality Assurance
Toneloc
41. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Fiber optic
Accountability
Software
Motion detector
42. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Nonce
Audit Trail
Hackers
Out of band
43. Internet Relay Chat.
VLANs
Vulnerability analysis tools
DOS
IRC
44. Must be in place for you to use a biometric system
Compiler
Biometric profile
Detective - Preventive - Corrective
Job rotation
45. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Audit Trail
Brewer-Nash model
Non-repudiation
Closed network
46. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
ARO (Annualized Rate of Occurrence)
Enticement
Certification
Keystroke logging
47. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Risk Management
Block cipher
WAP (Wireless Application Protocol)
Acceptable use
48. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
WTLS (Wireless Transport Layer Security)
Coax
Job rotation
Fraud
49. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Throughput of a Biometric System
Copyright
Data Mart
CGI (The Common Gateway Interface)
50. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Quality Assurance
Brewer-Nash model
Key Escrow
Due Diligence
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests