SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When two or more processes are linked and execute multiple programs simultaneously
Repeaters
Multiprocessing
Attenuation
Hardware
2. The real cost of acquiring/maintaining/developing a system
Asset Value
ActiveX Object Linking and Embedding
Privacy Act of 1974
ISDN (Integrated Services Digital Network)
3. Defines the objects and their attributes that exist in a database.
TACACS (Terminal access controller access control system)
Schema
RADIUS (Remote authentication dial-in user service)
Security kernel
4. More discriminate than dogs
ARP (Address Resolution Protocol)
Guards
Patriot Act
OEP
5. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
Senior Management
ARP (Address Resolution Protocol)
Compiler
TEMPEST
6. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Acceptable use
ARO (Annualized Rate of Occurrence)
/etc/passwd
MitM
7. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Software development lifecycle
Privacy Act of 1974
Software
Callback Security/Call Forwarding
8. Someone whose hacking is primarily targeted at the phone systems
Spoofing
Dictionary Attack
Phreaker
CIO
9. Closed Circuit Television
OSI Model
Birthday attack
CCTV
SQL (Structured Query Language)
10. Something used to put out a fire. Can be in Classes A - B - C - D - or H
/etc/passwd
Fire extinguisher
SLE (Single Loss Expectancy or Exposure)
Crosstalk
11. A network entity that provides a single entrance / exit point to the Internet.
Termination procedures
OEP
Separation of duties
Bastion hosts
12. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Senior Management
Smart cards
Polymorphism
DCOM
13. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
l0pht
DNS cache poisoning
Passive attacks
CIO
14. Once authenticated - the level of access you have to a system
Packet Sniffing
Burden of Proof
Authorization
Owner
15. After implementing countermeasures - accepting risk for the amount of vulnerability left over
CORBA
Virtual Memory/Pagefile.sys
Risk Acceptance
Software librarian
16. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Copyright
Biometric profile
Mandatory vacation
Software development lifecycle
17. Setting up the user to access the honeypot for reasons other than the intent to harm.
Motion detector
Entrapment
Rolling hot sites
Hacker
18. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
DDOS
Trap Door
VLANs
Incentive programs
19. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Rijndael
Macro
AES (Advanced Encryption Standard)
SSO (Single sign-on)
20. The practice of obtaining confidential information by manipulation of legitimate users.
NAT
Probing
Common criteria
Social engineering
21. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Embezzlement
Code of ethics
UUEncode
ActiveX Object Linking and Embedding
22. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Due Diligence
Caesar Cipher
Mandatory vacation
Fraud
23. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Virtual machine
Patriot Act
Risk Analysis
Expert systems
24. A self-replicating computer program - similar to a computer virus. A virus attaches itself to - and becomes part of - another executable program; however - a worm is self-contained and does not need to be part of another program to propagate itself.
Dogs
Worm
Virtual Memory/Pagefile.sys
AES (Advanced Encryption Standard)
25. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Mandatory vacation
Illegal/Unethical
ISDN (Integrated Services Digital Network)
Incentive programs
26. Public Key Infrastructure
PKI
Salami Slicing
Telnet
BIA
27. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
SSL/TLS
Dogs
CHAP
Symmetric
28. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Rijndael
Polymorphism
Virtual Memory/Pagefile.sys
Hardware
29. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
SSH
Patriot Act
Fiber optic
NAT
30. Also known as a tunnel)
VPN (Virtual Private Network)
Tokens
Firmware
CIO
31. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Transposition
Switches / Bridges
Trade Secret
Incentive programs
32. Ethernet - Cat5 - Twisted to allow for longer runs.
Clipper Chip
Normalization
Twisted pair
Eavesdropping
33. Basic Input/Output System
BIOS
AES (Advanced Encryption Standard)
Macro
Digital signing
34. The user
User
CORBA
Rolling hot sites
EF (Exposure Factor)
35. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Patent
Tokens
TEMPEST
ARO (Annualized Rate of Occurrence)
36. Enticing people to hit your honeypot to see how they try to access your system.
Enticement
Entrapment
Malware
Burden of Proof
37. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Firmware
Common criteria
Format 7 times
Fences
38. Network Address Translation
Data Mart
NAT
Call tree
COM
39. Dialing fixed sets telephone numbers looking for open modem connections to machines
Exit interview
Software librarian
Due Diligence
War dialing
40. Threat to physical security.
Certification
Promiscuous mode
Sabotage
Session Hijacking
41. Non-repudiation is the concept of ensuring that a contract - especially one agreed to via the Internet - cannot later be denied by one of the parties involved.
Non-repudiation
Accountability
Birthday attack
Hearsay Evidence
42. The person that controls access to the data
Noise & perturbation
Common criteria
Software development lifecycle
Custodian
43. When security is managed at many different points in an organization
Guards
Back door/ trap door/maintenance hook
Rolling hot sites
Decentralized
44. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Polymorphism
Risk Mitigation
Compiler
Reciprocal agreement
45. The process of reducing your risks to an acceptable level based on your risk analysis
Telnet
TCSEC
Risk Mitigation
Java
46. Personal - Network - and Application
Expert systems
Firewall types
Scanning
VLANs
47. This is an open international standard for applications that use wireless communications.
War dialing
Expert systems
WAP (Wireless Application Protocol)
DCOM
48. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Checksum
Security Perimeter
Script kiddies
Penetration testing
49. White hat l0pht
Data Mart
DNS cache poisoning
Bugtraq
Smurf
50. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Accountability
Format 7 times
Polymorphism
Repeaters
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests