SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
IRC
RADIUS (Remote authentication dial-in user service)
Honey pot
Hacker
2. Using ICMP to diagram a network
Virtual machine
Probing
Social engineering
OLE
3. A specialized form of software authentication that enables a user to authenticate once and gain access to the resources of multiple software systems.
CD-Rom
SSO (Single sign-on)
Privacy Act of 1974
Data remanence
4. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Security Perimeter
Granularity
Fraggle
Packet Sniffing
5. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
TCB
Polymorphism
Illegal/Unethical
Telnet
6. Occupant Emergency Plan - Employees are the most important!
Hot Site
OEP
PAP (Password Authentication Protocol)
Classes of IP networks
7. When two or more processes are linked and execute multiple programs simultaneously
Multiprocessing
Toneloc
RADIUS (Remote authentication dial-in user service)
Hackers
8. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Quantitative
SESAME
BIA
Probing
9. Relating to quality or kind. This assigns a level of importance to something.
Virtual Memory/Pagefile.sys
CRC (Cyclic Redundancy Check)
Biometric profile
Qualitative
10. Motive - Opportunity - and Means. These deal with crime.
MOM
Encryption
Compiler
Firmware
11. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
Hackers
Data Mart
War driving
Stream cipher
12. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
SSH
Carnivore
Multipartite
MitM
13. A RFC standard. A mechanism for performing commands on a remote system
Quantitative
Software development lifecycle
Birthday attack
Telnet
14. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Encryption
Finger printing
Risk Management
WTLS (Wireless Transport Layer Security)
15. Public Key Infrastructure
PKI
Trademark
Telnet
Centralized
16. Be at least 8 foot tall and have three strands of barbed wire.
Multithreading
Probing
Fences
Bastion hosts
17. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
Caesar Cipher
Throughput of a Biometric System
DMZ
Hearsay Evidence
18. Internet Architecture Board. This board is responsible for protecting the Internet.
IAB
Halon
Eavesdropping
Open network
19. Involving the measurement of quantity or amount.
TCB
CIRT
Quantitative
Clipping levels
20. Emanations from one wire coupling with another wire
MitM
Dogs
CHAP
Crosstalk
21. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Fences
/etc/passwd
Mandatory vacation
Coax
22. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Bugtraq
OSI Model
Exit interview
Hackers
23. Signal degradation as it moves farther from its source
Joke
Hearsay Evidence
Attenuation
Worm
24. Encompasses Risk Analysis and Risk Mitigation
Risk Management
Decentralized
Trademark
Software
25. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
ARP (Address Resolution Protocol)
Digest
Routers
Smurf
26. A sandbox. Emulates an operating environment.
DDOS
Virtual machine
Transposition
UUEncode
27. Testing a company's network to test for vulnerabilities in their systems so that weaknesses can be fixed. This testing does not actually fix anything.
Schema
DDOS
CD-Rom
Penetration testing
28. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Common criteria
Biometric profile
Entrapment
Rolling hot sites
29. Data storage formats and equipment that allow the stored data to be accessed in any order
Telnet
Trade Secret
Symmetric
RAM (Random-access memory)
30. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Privacy Act of 1974
Trademark
Digest
Trade Secret
31. Object Linking and Embedding. The ability of an object to be embedded into another object.
Aggregation
OLE
Owner
EF (Exposure Factor)
32. Dynamic Host Configuration Protocol.
Mandatory vacation
DHCP
BIOS
MOM
33. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Teardrop
Rijndael
Virtual machine
Artificial Neural Networks (ANN)
34. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Skipjack
Echelon
Security through obscurity
Technical - Administrative - Physical
35. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Termination procedures
Social engineering
Software librarian
Tort
36. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Rolling hot sites
Virtual Memory/Pagefile.sys
Centralized
Authentication
37. Ethernet - Cat5 - Twisted to allow for longer runs.
DDOS
Twisted pair
TACACS (Terminal access controller access control system)
Keystroke logging
38. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Noise & perturbation
Symmetric
Cyphertext only
Compiler
39. When one key of a two-key pair has more encryption pattern than the other
Privacy Act of 1974
Asymmetric
Software development lifecycle
Compiler
40. Software designed to infiltrate or damage a computer system - without the owner's consent.
Malware
Biometrics
Multiprocessing
TCP Wrappers
41. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Firmware
Service packs
Risk Transferring
Passive attacks
42. Class A (1-126.x.x.x) - Class B (128-191.x.x.x) - Class C (192-223.x.x.x)
Classes of IP networks
Embezzlement
Object Oriented Programming
Macro
43. In computer security and programming - it is an anomalous condition where a process attempts to store data beyond the boundaries of a buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include oth
Cryptanalysis
Object Oriented Programming
Buffer overflow
Granularity
44. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Toneloc
Digital signing
WTLS (Wireless Transport Layer Security)
Centralized
45. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
Base-64
Carnivore
Transposition
46. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
CORBA
Eavesdropping
Base-64
SQL (Structured Query Language)
47. Component Object Model.
COM
Illegal/Unethical
Bastion hosts
Security through obscurity
48. Someone whose hacking is primarily targeted at the phone systems
TACACS (Terminal access controller access control system)
Virtual Memory/Pagefile.sys
Compiler
Phreaker
49. A network that uses standard protocols (TCP/IP)
PAP (Password Authentication Protocol)
Authorization creep
OEP
Open network
50. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
Embezzlement
Senior Management
CHAP
CIA