SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
IAB
Authorization creep
Scanning
Separation of duties
2. An instance of a scripting language
Script
Clipping levels
User
WAP (Wireless Application Protocol)
3. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
EF (Exposure Factor)
Bugtraq
Vulnerability analysis tools
Stream cipher
4. Same as a block cipher except that it is applied to a data stream one bit at a time
Termination procedures
RAM (Random-access memory)
Stream cipher
Social engineering
5. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Firmware
DCOM
ROM (Read-only memory)
Teardrop
6. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Due Diligence
Privacy Act of 1974
Transposition
CRC (Cyclic Redundancy Check)
7. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Digital certificates
Bugtraq
User
Cookies
8. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Firmware
Firewall types
Joke
Toneloc
9. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Biometric profile
Raid 0 - 1 - 3 - 5
Substitution
Trademark
10. Jumping into dumpsters to retrieve information about someone/something/a company
Clipper Chip
Entrapment
Hubs
Dumpster diving
11. Accepting all packets
CIRT
Due Diligence
Promiscuous mode
Risk Management
12. Dynamic Host Configuration Protocol.
DHCP
Trade Secret
Motion detector
Bastion hosts
13. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
BIA
Repeaters
Base-64
Brute force
14. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Honey pot
Identification
Polymorphism
MitM
15. Common Object Request Broker Architecture.
Teardrop
CORBA
Eavesdropping
Tailgating / Piggybacking
16. When security is managed at a central point in an organization
Packet Sniffing
Reciprocal agreement
Security through obscurity
Centralized
17. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Due Diligence
UUEncode
Transposition
Carnivore
18. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Bugtraq
UUEncode
Risk Mitigation
Certification
19. A network that mimics the brain
Asymmetric
Well-known ports
Encryption
Artificial Neural Networks (ANN)
20. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Hardware
VPN (Virtual Private Network)
Routers
Exit interview
21. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Trap Door
CGI (The Common Gateway Interface)
Fire extinguisher
Expert systems
22. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Echelon
Quantitative
Mandatory vacation
Trap Door
23. The process of developing a planned approach to change in an organization. Typically the objective is to maximize the collective benefits for all people involved in the change and minimize the risk of failure of implementing the change.
Nonce
Change management
Burden of Proof
l0pht
24. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Polymorphic
OSI Model
Expert systems
Hash
25. The person that determines the permissions to files. The data owner.
Multiprocessing
Joke
Owner
Service packs
26. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Session Hijacking
Hash
MOM
Key Escrow
27. A site that has some equipment in place - and can be up within days
Toneloc
Risk Acceptance
Warm Site
Phreaker
28. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
CIRT
Job rotation
Attenuation
Technical - Administrative - Physical
29. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.
Keystroke logging
Script kiddies
CHAP
Digital signing
30. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Normalization
ISDN (Integrated Services Digital Network)
MitM
Hash
31. Motivational tools for employee awareness to get them to report security flaws in an organization
Incentive programs
Degausser
Two-Factor Authentication
Probing
32. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Data remanence
Fiber optic
TEMPEST
ARO (Annualized Rate of Occurrence)
33. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Privacy Act of 1974
Guards
Compiler
Copyright
34. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
CIRT
Data Mart
Risk Acceptance
Wiretapping
35. Internet Relay Chat.
Hash
MitM
Spoofing
IRC
36. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Quantitative
AES (Advanced Encryption Standard)
Burden of Proof
DNS cache poisoning
37. Data storage formats and equipment that allow the stored data to be accessed in any order
Finger scanning
RAM (Random-access memory)
Multithreading
Bastion hosts
38. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Security Awareness Training
Motion detector
Salami Slicing
OLE
39. Someone whose hacking is primarily targeted at the phone systems
Phreaker
Fraud
Tort
Inference
40. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
TCSEC
Call tree
Virtual Memory/Pagefile.sys
Smurf
41. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Virtual machine
Man trap
Penetration testing
Birthday attack
42. Same as AES Advanced Encryption Standard (AES) - also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor -
Virtual Memory/Pagefile.sys
Replay
Base-64
Rijndael
43. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
ROT-13
War dialing
Trap Door
/etc/passwd
44. Basic Input/Output System
Data remanence
Hackers
BIOS
RAM (Random-access memory)
45. Animals with teeth. Not as discriminate as guards
Probing
ISDN (Integrated Services Digital Network)
SSL/TLS
Dogs
46. Someone who hacks
Routers
Quality Assurance
Hacker
Boot-sector Virus
47. Threat to physical security.
Sabotage
Common criteria
Embezzlement
Granularity
48. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Vulnerability analysis tools
Authorization creep
TACACS (Terminal access controller access control system)
Penetration testing
49. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
Identification
VPN (Virtual Private Network)
Fiber optic
Patriot Act
50. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Bastion hosts
Halon
Illegal/Unethical
Cyphertext only