SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Bugtraq
VLANs
Back door/ trap door/maintenance hook
Active attacks
2. A site that is ready physically but has no hardware in place - all it has is HVAC
Fraud
CORBA
Risk Analysis
Cold Site
3. The person that determines the permissions to files. The data owner.
Exit interview
Finger printing
Owner
Mandatory vacation
4. Internet Architecture Board. This board is responsible for protecting the Internet.
Non-repudiation
IAB
ActiveX Object Linking and Embedding
Multipartite
5. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
Data Mart
Incentive programs
Out of band
Covert channels
6. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Sniffing
Accreditation
SLE (Single Loss Expectancy or Exposure)
SSO (Single sign-on)
7. Disclosure - Alteration - Destruction. These things break the CIA triad
Asymmetric
DAD
Substitution
Security kernel
8. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Trap Door
TEMPEST
Trademark
Job rotation
9. A network that uses proprietary protocols
Fiber optic
Dictionary Attack
Risk Analysis
Closed network
10. The art of breaking code. Testing the strength of an algorithm.
Polymorphic
Due Care
Cryptanalysis
Change management
11. Chief Executive Officer
CEO
Polymorphism
CIA
War dialing
12. Entails planning and system actions to ensure that a project is following good quality management practices
Boot-sector Virus
TCP Wrappers
CCTV
Quality Assurance
13. Accepting all packets
Username/password
Promiscuous mode
Multipartite
Session Hijacking
14. A mechanism by which connections to TCP services on a system are allowed or disallowed
Macro
Trojan horses
Smurf
TCP Wrappers
15. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
CORBA
Kerberos
ROT-13
Exit interview
16. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Username/password
Format 7 times
WTLS (Wireless Transport Layer Security)
Security kernel
17. Animals with teeth. Not as discriminate as guards
Toneloc
Dogs
Brute force
Multiprocessing
18. CISSPs subscribe to a code of ethics for building up the security profession
Classes of IP networks
TCB
Code of ethics
OEP
19. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
Hot Site
MOM
CGI (The Common Gateway Interface)
Dogs
20. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Script
Echelon
Covert channels
Salami Slicing
21. A hidden communications channel on a system that allows for the bypassing of the system security policy
Hackers
Covert channels
Tort
DOS
22. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
Software
Fraggle
Buffer overflow
Clipper Chip
23. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Masquerade
MitM
Risk Transferring
Firmware
24. Provides for less data leakage. Longer distance. Uses light instead of electrical impulse.
Buffer overflow
Authorization
Fiber optic
VLANs
25. A gas used in fire suppression. Not human safe. Chemical reaction.
Halon
RAM (Random-access memory)
Firewall types
Raid 0 - 1 - 3 - 5
26. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Stream cipher
Finger printing
CIO
OEP
27. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
Covert channels
War dialing
VLANs
Granularity
28. Data storage formats and equipment that allow the stored data to be accessed in any order
Substitution
RAM (Random-access memory)
Encryption
Replay
29. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Passive attacks
Fire extinguisher
Copyright
UUEncode
30. Repeats the signal. It amplifies the signal before sending it on.
Normalization
Masquerade
CD-Rom
Repeaters
31. Threat to physical security.
Logic bomb
Sabotage
Two-Factor Authentication
Detective - Preventive - Corrective
32. Motivational tools for employee awareness to get them to report security flaws in an organization
Compiler
Incentive programs
Fiber optic
Data remanence
33. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
/etc/passwd
MOM
Degausser
Hearsay Evidence
34. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
CGI (The Common Gateway Interface)
Key Escrow
Centralized
PKI
35. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Brute force
Artificial Neural Networks (ANN)
Due Care
Accountability
36. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Content dependant
BIOS
Macro
Repeaters
37. Someone who hacks
Two-Factor Authentication
SESAME
Honey pot
Hacker
38. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
Twisted pair
WTLS (Wireless Transport Layer Security)
Carnivore
ROM (Read-only memory)
39. The user
User
Entrapment
DCOM
Hash
40. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Asymmetric
Inference
Hubs
Carnivore
41. Chief Information Officer
Inference
CIO
Job rotation
Reciprocal agreement
42. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
EF (Exposure Factor)
Multithreading
Hackers
Due Diligence
43. To not be legal (as far as law is concerned) or ethical
Illegal/Unethical
Throughput of a Biometric System
Open network
Artificial Neural Networks (ANN)
44. Ethernet - Cat5 - Twisted to allow for longer runs.
Clipper Chip
Birthday attack
Trade Secret
Twisted pair
45. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Script
Twisted pair
CD-Rom
Termination procedures
46. The frequency with which a threat is expected to occur.
ARO (Annualized Rate of Occurrence)
Compiler
Telnet
COM
47. A chipset that was developed and promoted by the U.S. Government as an encryption device to be adopted by telecommunications companies for voice transmission.
Entrapment
Clipper Chip
Object Oriented Programming
Termination procedures
48. Signal degradation as it moves farther from its source
Buffer overflow
Data Mart
BIA
Attenuation
49. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
Phreaker
VPN (Virtual Private Network)
Patent
SQL (Structured Query Language)
50. Using ICMP to diagram a network
Social engineering
Normalization
Probing
IAB