SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Tokens
Security kernel
Scanning
Noise & perturbation
2. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Penetration testing
Asset Value
Multipartite
SSL/TLS
3. An audit trail is a chronological sequence of audit records - each of which contains evidence directly pertaining to and resulting from the execution of a business process or system function. Audit records typically result from activities such as tra
Cryptanalysis
Audit Trail
Key Escrow
Smart cards
4. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Passive attacks
Brute force
Dogs
/etc/passwd
5. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Hardware
ActiveX Object Linking and Embedding
WAP (Wireless Application Protocol)
Centralized
6. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Base-64
Private Addressing
Hot Site
Inference
7. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Skipjack
Cyphertext only
Software development lifecycle
Halon
8. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
AES (Advanced Encryption Standard)
Risk Transferring
Data remanence
Wiretapping
9. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Promiscuous mode
Out of band
Security through obscurity
Risk Mitigation
10. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Salami Slicing
Centralized
Private Addressing
ROT-13
11. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
Java
Keystroke logging
CEO
Symmetric
12. A site that has some equipment in place - and can be up within days
Warm Site
Aggregation
WAP (Wireless Application Protocol)
Well-known ports
13. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Patent
Buffer overflow
Hash
CIO
14. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Well-known ports
Common criteria
Throughput of a Biometric System
Checksum
15. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
Digital certificates
Kerberos
Senior Management
Artificial Neural Networks (ANN)
16. Once authenticated - the level of access you have to a system
Illegal/Unethical
Authorization
Incentive programs
Switches / Bridges
17. Internet Relay Chat.
Software
IRC
DOS
Finger printing
18. Closed Circuit Television
CCTV
Dictionary Attack
Username/password
BIOS
19. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Hardware
Packet Sniffing
Multiprocessing
Key Escrow
20. Continuation of Operations Plan
Masquerade
NAT
Passive attacks
COOP
21. CISSPs subscribe to a code of ethics for building up the security profession
Smart cards
DNS cache poisoning
OSI Model
Code of ethics
22. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Due Diligence
Wiretapping
Sniffing
Expert systems
23. A mechanism by which connections to TCP services on a system are allowed or disallowed
SYN Flood
TCP Wrappers
ROT-13
Packet Sniffing
24. When two or more processes are linked and execute multiple programs simultaneously
Software librarian
CCTV
Multiprocessing
Acceptable use
25. The practice of obtaining confidential information by manipulation of legitimate users.
CCTV
Owner
Social engineering
Aggregation
26. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
SLE (Single Loss Expectancy or Exposure)
ROT-13
Quantitative
Logic bomb
27. An attacker spoofs the source IP in a packet header - to make a ping request appear to have originated from the future victim's network - then the responding network responds in full force to these requests and brings down the victim's network.
Burden of Proof
Smurf
Cryptanalysis
Noise & perturbation
28. When security is managed at many different points in an organization
Code of ethics
Decentralized
Aggregation
Accreditation
29. When one key of a two-key pair has more encryption pattern than the other
IRC
Incentive programs
Asymmetric
Risk Analysis
30. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
Repeaters
DCOM
Firewall types
SSH
31. Be at least 8 foot tall and have three strands of barbed wire.
Fences
Penetration testing
Open network
Quantitative
32. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Hot Site
Termination procedures
OLE
Buffer overflow
33. The output of a hash function is a digest.
Expert systems
Quantitative
SESAME
Digest
34. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Diffie-Hellman
Switches / Bridges
Malware
Technical - Administrative - Physical
35. Relating to quality or kind. This assigns a level of importance to something.
Qualitative
COOP
Code of ethics
Man trap
36. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Buffer overflow
DAD
Format 7 times
UUEncode
37. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
Asset Value
CRC (Cyclic Redundancy Check)
Trade Secret
Debug
38. Entails planning and system actions to ensure that a project is following good quality management practices
VPN (Virtual Private Network)
Quality Assurance
Two-Factor Authentication
Code of ethics
39. An attempt to trick the system into believing that something false is real
Hoax
Authorization
Penetration testing
Exit interview
40. A hidden communications channel on a system that allows for the bypassing of the system security policy
Artificial Neural Networks (ANN)
WTLS (Wireless Transport Layer Security)
Mandatory vacation
Covert channels
41. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Encryption
IRC
Script
Trademark
42. Determines the monetary loss (impact) for each occurrence of a threatened event. SLE = Asset Value x Exposure Factor
Carnivore
SLE (Single Loss Expectancy or Exposure)
EF (Exposure Factor)
Service packs
43. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Entrapment
Sniffing
Logic bomb
Toneloc
44. Providing verification to a system
Authentication
Call tree
Fences
Trojan horses
45. Network devices that operate at layer 3. This device separates broadcast domains.
Routers
Termination procedures
Packet Sniffing
Tailgating / Piggybacking
46. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Cookies
Format 7 times
Callback Security/Call Forwarding
Attenuation
47. An imaginary boundary between the components that make up the TCB and the components that are not covered by the TCB
Security Perimeter
User
Cold Site
CIA
48. The process of reducing your risks to an acceptable level based on your risk analysis
Risk Mitigation
/etc/passwd
Covert channels
Key Escrow
49. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Open network
Honey pot
Authorization
SSL/TLS
50. In computer security - this type of attack is a situation in which one person or program successfully masquerades as another by falsifying data and thereby gains an illegitimate advantage.
Spoofing
Service packs
Vulnerability analysis tools
Content dependant