SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An attempt to trick the system into believing that something false is real
BIA
Hoax
SQL (Structured Query Language)
Multiprocessing
2. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Enticement
Dumpster diving
Fiber optic
COOP
3. Residual physical representation of data that has been in some way erased. After storage media is erased there may be some physical characteristics that allow data to be reconstructed.
Trojan horses
DDOS
Technical - Administrative - Physical
Data remanence
4. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
SESAME
RADIUS (Remote authentication dial-in user service)
Hacker
Risk Transferring
5. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
Quality Assurance
SSO (Single sign-on)
Authorization creep
WTLS (Wireless Transport Layer Security)
6. Someone who hacks using programs that they can download from the Internet. This person usually doesn't find new exploits - but simply exploits vulnerabilities that others have found.
Script kiddies
Sniffing
Quantitative
Carnivore
7. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
Diffie-Hellman
SLE (Single Loss Expectancy or Exposure)
OSI Model
Skipjack
8. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Risk Analysis
Replay
Custodian
Symmetric
9. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
Trade Secret
Routers
ARP (Address Resolution Protocol)
Kerberos
10. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Accountability
Degausser
Classes of IP networks
TACACS (Terminal access controller access control system)
11. A RFC standard. A mechanism for performing commands on a remote system
Skipjack
Burden of Proof
Brute force
Telnet
12. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Asymmetric
Salami Slicing
Diffie-Hellman
Active attacks
13. This is an open international standard for applications that use wireless communications.
Private Addressing
CIA
WAP (Wireless Application Protocol)
Bugtraq
14. Also civil law
TACACS (Terminal access controller access control system)
Tailgating / Piggybacking
Tort
Biometrics
15. Affects the section of a floppy or hard disk that contains operating system and file information. Each time you start your PC with an infected floppy in the drive - the virus can spread.
Virtual Memory/Pagefile.sys
Software
Boot-sector Virus
IRC
16. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
VPN (Virtual Private Network)
Granularity
Normalization
/etc/passwd
17. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.
Call tree
Keystroke logging
Inference
Job rotation
18. Involving the measurement of quantity or amount.
Security kernel
Quantitative
Asset Value
Fiber optic
19. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Risk Transferring
l0pht
Caesar Cipher
ROT-13
20. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Carnivore
COM
Kerberos
Active attacks
21. Distributed Component Object Model. Microsoft's implementation of CORBA.
MitM
Dogs
DCOM
Classes of IP networks
22. Confidentiality - Integrity - and Availability
CIA
Noise & perturbation
Block cipher
Multipartite
23. The frequency with which a threat is expected to occur.
SSO (Single sign-on)
ARO (Annualized Rate of Occurrence)
Open network
Sniffing
24. Motivational tools for employee awareness to get them to report security flaws in an organization
Dogs
SLE (Single Loss Expectancy or Exposure)
Incentive programs
ROM (Read-only memory)
25. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Trojan horses
Out of band
Security kernel
Expert System
26. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Termination procedures
Quantitative
Hardware
CIA
27. The art of breaking code. Testing the strength of an algorithm.
Smurf
Cryptanalysis
Crosstalk
Asymmetric
28. Dynamic Host Configuration Protocol.
Attenuation
Qualitative
DHCP
Software librarian
29. Encompasses Risk Analysis and Risk Mitigation
Risk Management
Digest
Block cipher
UUEncode
30. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Buffer overflow
Authentication
Hot Site
Quantitative
31. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Firmware
Separation of duties
Bastion hosts
Privacy Act of 1974
32. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Custodian
Trojan horses
Cryptanalysis
Java
33. Be at least 8 foot tall and have three strands of barbed wire.
Tailgating / Piggybacking
Fences
Masquerade
Acceptable use
34. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
CIO
RADIUS (Remote authentication dial-in user service)
Privacy Act of 1974
DNS cache poisoning
35. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Audit Trail
Owner
Virtual Memory/Pagefile.sys
ARO (Annualized Rate of Occurrence)
36. Network device that operates at layer 1. Concentrator.
Firewall types
Non-repudiation
Crosstalk
Hubs
37. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
MitM
Clipper Chip
Session Hijacking
Sabotage
38. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
IAB
Covert channels
Macro
Normalization
39. A technique to eliminate data redundancy.
Tokens
Key Escrow
Normalization
WAP (Wireless Application Protocol)
40. Using ICMP to diagram a network
Block cipher
Probing
Warm Site
Illegal/Unethical
41. Internet Relay Chat.
Username/password
Call tree
Cyphertext only
IRC
42. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
Biometrics
Masquerade
Patriot Act
IAB
43. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Firmware
ALE (Annualized Loss Expectancy)
Private Addressing
Virtual machine
44. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Security Perimeter
Virtual Memory/Pagefile.sys
Trademark
MOM
45. Network devices that operate at layer 3. This device separates broadcast domains.
Separation of duties
Privacy Act of 1974
Routers
Bastion hosts
46. The 7 layer model defined by the ISO. Memorized by 'All People Seem To Need Data Processing' and 'Please Do Not Throw Sausage Pizza Away'. Actually - the layers are Application - Presentation - Session - Transport - Network - Data Link - Physical
User
OSI Model
Technical - Administrative - Physical
Script kiddies
47. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Digital signing
ALE (Annualized Loss Expectancy)
Patent
Noise & perturbation
48. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Sniffing
TCP Wrappers
Incentive programs
Firewall types
49. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Diffie-Hellman
Debug
Technical - Administrative - Physical
Packet Sniffing
50. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Multitasking
Risk Transferring
Polymorphic
Block cipher
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests