SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Attack which does not result in an unauthorized state change - such as an attack that only monitors and/or records data.
Passive attacks
Phreaker
Multithreading
CIO
2. A computer network authentication protocol which allows individuals communicating over an insecure network to prove their identity to one another in a secure manner. Kerberos prevents eavesdropping or replay attacks - and ensures the integrity of the
SSH
Detective - Preventive - Corrective
Halon
Kerberos
3. 1 - 1024 are the ports registered to Internet applications. Ones on the test include: 20 - ftp 21 - ftp 22 - ssh 23 - telnet 25 - smtp 53 - dns 69 - tftp 80 - http 161 - snmp 443 - ssl
IRC
Hot Site
SLE (Single Loss Expectancy or Exposure)
Well-known ports
4. A set of rules applied by many transit networks which restrict the ways in which the network may be used.
Acceptable use
UUEncode
Security Awareness Training
Toneloc
5. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Throughput of a Biometric System
CHAP
Risk Acceptance
VLANs
6. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Switches / Bridges
Mandatory vacation
Fraud
Software librarian
7. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Diffie-Hellman
Security Awareness Training
Brute force
TCSEC
8. The process of training end users / employees in the ways and processes of security. This helps to mitigate risk to the company (if the employees know what to do) and also helps the employees to know what is expected of them security-wise - so that t
Security Awareness Training
Inference
Two-Factor Authentication
Macro
9. A site that is ready physically but has no hardware in place - all it has is HVAC
Cold Site
Asymmetric
Accreditation
IAB
10. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Attenuation
Smart cards
Worm
DOS
11. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Birthday attack
Authorization creep
VPN (Virtual Private Network)
ROT-13
12. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Software development lifecycle
Telnet
Vulnerability analysis tools
Bastion hosts
13. Using ICMP to diagram a network
Teardrop
CGI (The Common Gateway Interface)
Script
Probing
14. Closed Circuit Television
Cyphertext only
Finger scanning
Sabotage
CCTV
15. Also known as a tunnel)
Security kernel
TEMPEST
VPN (Virtual Private Network)
Due Care
16. In computing - it is software that is embedded in a hardware device. It is often provided on flash ROMs or as a binary image file that can be uploaded onto existing hardware by a user.
Nonce
Due Diligence
Granularity
Firmware
17. Identifying risks and assessing the possible damage that can be caused in order to justify security safeguards
Checksum
CEO
Risk Analysis
Multithreading
18. A mechanism by which connections to TCP services on a system are allowed or disallowed
Debug
Hoax
Fiber optic
TCP Wrappers
19. Someone who hacks
Fiber optic
IRC
Noise & perturbation
Hacker
20. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Fire extinguisher
Hash
Motion detector
SYN Flood
21. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Copyright
Multiprocessing
Penetration testing
Joke
22. Virtual memory is an area of 'memory' that is not in physical memory (RAM) but on the disk system to allow for extra 'memory' processing area above what is available through RAM. This is the pagefile.sys file on a Windows system. Many Windows OSs req
Checksum
SYN Flood
Virtual Memory/Pagefile.sys
Trademark
23. The practice of obtaining confidential information by manipulation of legitimate users.
ARP (Address Resolution Protocol)
Stream cipher
Social engineering
Penetration testing
24. A set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated - public disclosure of certain details of a device - method - process or composition of matter (substance) (known as an invention) which
CD-Rom
Patent
Fire extinguisher
Accreditation
25. A formula - practice - process - design - instrument - pattern - or compilation of information used by a business to obtain an advantage over competitors within the same industry or profession.
Multiprocessing
Trade Secret
Honey pot
Joke
26. Object Linking and Embedding. The ability of an object to be embedded into another object.
MOM
OLE
Expert systems
Hacker
27. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Privacy Act of 1974
Multithreading
Honey pot
Fences
28. A system designed to stop piggybacking.
Non-repudiation
Hash
Man trap
CGI (The Common Gateway Interface)
29. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Clipping levels
Two-Factor Authentication
Out of band
Digital signing
30. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Out of band
Risk Transferring
Privacy Act of 1974
Packet Sniffing
31. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
Trademark
Worm
Trade Secret
CORBA
32. Being able to control access to individuals very specifically - instead of lower in the OSI model where you cant set it so specifically
CIA
BIA
Granularity
Diffie-Hellman
33. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Separation of duties
Open network
TCSEC
War driving
34. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Encryption
ROT-13
Finger scanning
Carnivore
35. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
MitM
VLANs
Bastion hosts
DHCP
36. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Non-repudiation
Throughput of a Biometric System
WAP (Wireless Application Protocol)
Hearsay Evidence
37. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
ALE (Annualized Loss Expectancy)
Authentication
Termination procedures
BIA
38. When security is managed at many different points in an organization
ISDN (Integrated Services Digital Network)
RADIUS (Remote authentication dial-in user service)
Copyright
Decentralized
39. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Private Addressing
Polymorphism
Firmware
Job rotation
40. Refers to any of the various programs by which a computer controls aspects of its operations - such as those for translating data from one form to another - as contrasted with hardware - which is the physical equipment comprising the installation.
TCSEC
DHCP
Brute Force
Software
41. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Acceptable use
Logic bomb
Nonce
Fraggle
42. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Format 7 times
Common criteria
Covert channels
Coax
43. The act of identifying yourself. Providing your identity to a system
Trade Secret
Checksum
Identification
Authorization creep
44. Driving around enumerating wireless networks with the proper equipment (antennas and the like)
War driving
TCP Wrappers
Hearsay Evidence
WTLS (Wireless Transport Layer Security)
45. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s
Virtual Memory/Pagefile.sys
Enticement
Trademark
Diffie-Hellman
46. Continuation of Operations Plan
Phreaker
COOP
TCB
Granularity
47. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
AES (Advanced Encryption Standard)
Senior Management
Digest
Aggregation
48. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
SSL/TLS
Custodian
Incentive programs
Schema
49. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
Degausser
Routers
SLE (Single Loss Expectancy or Exposure)
SYN Flood
50. Making individuals accountable for their actions on a system typically through the use of auditing
Macro
Accountability
SSH
ARO (Annualized Rate of Occurrence)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests