SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Differs from ordinary composition in that it does not imply ownership. In composition - when the owning object is destroyed - so are the contained objects. In aggregation - this is not necessarily true.
Security kernel
Aggregation
TCP Wrappers
RADIUS (Remote authentication dial-in user service)
2. When you have a certain amount of access and you change jobs and you keep that access from the previous position. Also known as enlargement of permission and privilege escalation.
Authorization creep
DOS
Decentralized
PKI
3. After implementing countermeasures - accepting risk for the amount of vulnerability left over
PAP (Password Authentication Protocol)
Risk Acceptance
Sabotage
Software development lifecycle
4. The effort made by an ordinarily prudent or reasonable party to avoid harm to another party or himself. Deals with liability.
Security kernel
Honey pot
Due Diligence
Hot Site
5. Personal - Network - and Application
Firewall types
Polymorphic
DAD
COM
6. A technique to eliminate data redundancy.
Logic bomb
Normalization
Termination procedures
Teardrop
7. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Hacker
Macro
Malware
Coax
8. Threat to physical security.
Expert systems
Motion detector
Risk Management
Sabotage
9. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Smurf
Twisted pair
Active attacks
Technical - Administrative - Physical
10. Packet sniffers (also known as Network Analyzers or Ethernet Sniffers) are software programs that can see the traffic passing over a network or part of a network. As data streams travel back and forth over the network - the program captures each pack
Service packs
Back door/ trap door/maintenance hook
Phreaker
Sniffing
11. Closed Circuit Television
Artificial Neural Networks (ANN)
Rolling hot sites
CCTV
CRC (Cyclic Redundancy Check)
12. Defines the objects and their attributes that exist in a database.
Birthday attack
Schema
War dialing
Termination procedures
13. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Fraud
Penetration testing
Authorization creep
Brute force
14. Provides a means to obtain passwords or encryption keys and thus bypass other security measures. This can be accomplished through hardware or software means.
Keystroke logging
Qualitative
Packet Sniffing
Well-known ports
15. The attacker sends a SYN request to the victims machine and the victim machine allocates resources for that request and sends a SYN/ACK back. The attacking machine doesn't respond however - but instead sends another SYN and continues to do so until t
Multipartite
SYN Flood
NAT
Polymorphism
16. The illegal practice of stealing money repeatedly in extremely small quantities - usually by taking advantage of rounding to the nearest cent (or other monetary unit) in financial transactions. Salami slicing is most often performed by employees of t
Salami Slicing
Scanning
Burden of Proof
Covert channels
17. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
ARO (Annualized Rate of Occurrence)
Finger printing
Authentication
Coax
18. The practice of obtaining confidential information by manipulation of legitimate users.
Passive attacks
Clipping levels
Social engineering
Hearsay Evidence
19. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Birthday attack
Format 7 times
Script kiddies
CRC (Cyclic Redundancy Check)
20. The study of automated methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology - biometric authentication refers to technologies that measure and analyze human physical and beh
Hardware
Clipper Chip
Motion detector
Biometrics
21. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
TCP Wrappers
SESAME
Packet Sniffing
Attenuation
22. Also civil law
Security Awareness Training
Virtual Memory/Pagefile.sys
Tort
Biometrics
23. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
Detective - Preventive - Corrective
MOM
Callback Security/Call Forwarding
Expert systems
24. RFC 1918 defined the following addresses as the private addressing ranges: 192.168.x.x - 10.x.x.x - 172.16.x.x - 172.31.x.x
Motion detector
Illegal/Unethical
SQL (Structured Query Language)
Private Addressing
25. Signal degradation as it moves farther from its source
War driving
Cookies
Attenuation
Script
26. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
TCSEC
Software development lifecycle
Macro
Salami Slicing
27. Same as a block cipher except that it is applied to a data stream one bit at a time
VPN (Virtual Private Network)
Stream cipher
Encryption
Checksum
28. The ability to have more than one thread associated with a process
Tokens
War driving
Multithreading
Bugtraq
29. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Attenuation
Brute Force
Transposition
Block cipher
30. When an employee leaves the company - you want to make them aware of non-disclosures and non compete clauses - etc.
Transposition
Detective - Preventive - Corrective
Granularity
Exit interview
31. A birthday attack is a type of cryptographic attack which exploits the mathematics behind the birthday paradox - making use of a space-time tradeoff.
Enticement
Birthday attack
Skipjack
PKI
32. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Noise & perturbation
Risk Transferring
Termination procedures
Multithreading
33. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Asset Value
VPN (Virtual Private Network)
Tokens
OLE
34. Internet Architecture Board. This board is responsible for protecting the Internet.
ARO (Annualized Rate of Occurrence)
DOS
IAB
Firmware
35. When a DNS server goes out to resolve a name - and gets the wrong response back - it caches the wrong address for the default DNS time period - thus poisoning the cache for that period of time
Transposition
Normalization
DNS cache poisoning
Guards
36. (OLE) is a distributed object system and protocol developed by Microsoft. OLE allows an editor to 'farm out' part of a document to another editor and then reimport it. Its primary use is for managing compound documents - but it is also used for trans
SLE (Single Loss Expectancy or Exposure)
ActiveX Object Linking and Embedding
Throughput of a Biometric System
Substitution
37. In a separation of duties model - this is where code is checked in and out
SSH
ALE (Annualized Loss Expectancy)
Software librarian
Qualitative
38. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
UUEncode
Job rotation
OLE
Encryption
39. Internet Relay Chat.
Wiretapping
IRC
BIOS
AES (Advanced Encryption Standard)
40. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
Security Awareness Training
Hearsay Evidence
Classes of IP networks
Software librarian
41. The frequency with which a threat is expected to occur.
OEP
Fraggle
ARO (Annualized Rate of Occurrence)
Switches / Bridges
42. Countermeasures / safeguards fall into these categories. Detective measures detect - preventive measures prevent - and corrective measures correct.
Attenuation
Joke
Data remanence
Detective - Preventive - Corrective
43. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Telnet
COM
Kerberos
Smart cards
44. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Patriot Act
Tokens
Fiber optic
AES (Advanced Encryption Standard)
45. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Trojan horses
Script
Active attacks
TCSEC
46. In computer networking - this is the method for finding a host's hardware address when only its IP address is known. Due to the overwhelming prevalence of IPv4 and ethernet - ARP is primarily used to translate ethernet MAC addresses from IP addresses
Burden of Proof
ARP (Address Resolution Protocol)
Social engineering
Well-known ports
47. Transferring your risk to someone else - typically an insurance company
IAB
CIO
Mandatory vacation
Risk Transferring
48. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Accreditation
Probing
Throughput of a Biometric System
CORBA
49. Network devices that operate at layer 3. This device separates broadcast domains.
CD-Rom
Routers
Code of ethics
Guards
50. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Echelon
Firmware
Risk Transferring
Teardrop