SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When one key of a two-key pair has more encryption pattern than the other
Asymmetric
Echelon
Symmetric
Covert channels
2. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Data remanence
Trap Door
Reciprocal agreement
Expert systems
3. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Well-known ports
Buffer overflow
SSL/TLS
Object Oriented Programming
4. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
/etc/passwd
Checksum
Open network
ARP (Address Resolution Protocol)
5. In cryptanalysis and computer security - this attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching a large number of possibilities. In contrast with a brute forc
Trojan horses
Dictionary Attack
Finger printing
BIA
6. Occupant Emergency Plan - Employees are the most important!
Risk Transferring
Kerberos
DDOS
OEP
7. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
Exit interview
l0pht
Caesar Cipher
Brute force
8. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
Burden of Proof
Motion detector
DNS cache poisoning
SSH
9. A mechanism by which connections to TCP services on a system are allowed or disallowed
Dogs
MOM
ROT-13
TCP Wrappers
10. Animals with teeth. Not as discriminate as guards
Data remanence
Switches / Bridges
Dogs
Smart cards
11. Also civil law
Tort
Senior Management
VLANs
Accreditation
12. Involving the measurement of quantity or amount.
Phreaker
EF (Exposure Factor)
Trojan horses
Quantitative
13. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Eavesdropping
Teardrop
Incentive programs
Security Perimeter
14. Motivational tools for employee awareness to get them to report security flaws in an organization
TCP Wrappers
Accountability
TCB
Incentive programs
15. A little piece of information that is put on your computer to allow communications with the server and that also allow some servers to track everything you go to on the Internet
Transposition
Cookies
Attenuation
Firewall types
16. A form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. This is carried out either by the originator or by an adversary who intercepts the data and retransmits it - possibly as part of a masquer
Risk Transferring
Entrapment
Honey pot
Replay
17. Component Object Model.
Script
Privacy Act of 1974
DMZ
COM
18. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Expert systems
Multitasking
Echelon
Polymorphic
19. Network device that operates at layer 1. Concentrator.
Hubs
Authorization creep
Detective - Preventive - Corrective
Passive attacks
20. When security is managed at a central point in an organization
War driving
Dictionary Attack
Centralized
Block cipher
21. Someone who hacks
COM
Hacker
CGI (The Common Gateway Interface)
Repeaters
22. Defines the objects and their attributes that exist in a database.
Quality Assurance
Software librarian
Schema
Burden of Proof
23. Providing verification to a system
Non-repudiation
Software librarian
Authentication
Teardrop
24. This factor represents a measure of the magnitude of loss or impact on the value of an asset.
Risk Analysis
EF (Exposure Factor)
Detective - Preventive - Corrective
Telnet
25. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
Passive attacks
Promiscuous mode
Accountability
Degausser
26. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
DCOM
COOP
Patriot Act
Dumpster diving
27. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
Brute Force
CIO
Risk Management
Trademark
28. Setting up the user to access the honeypot for reasons other than the intent to harm.
Digest
Entrapment
Brewer-Nash model
Degausser
29. The process of reducing your risks to an acceptable level based on your risk analysis
DCOM
Incentive programs
Fraggle
Risk Mitigation
30. They all deal with objects or identifiers that are used during authentication. They provide information that will allow the authentication to happen. There are many types.
Tokens
OSI Model
Back door/ trap door/maintenance hook
Boot-sector Virus
31. More discriminate than dogs
War dialing
DDOS
Guards
Rijndael
32. Dynamic Host Configuration Protocol.
DHCP
Coax
Multithreading
Keystroke logging
33. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Dictionary Attack
Service packs
Termination procedures
Fraggle
34. This is an open international standard for applications that use wireless communications.
ROM (Read-only memory)
Promiscuous mode
ARO (Annualized Rate of Occurrence)
WAP (Wireless Application Protocol)
35. To not be legal (as far as law is concerned) or ethical
Security through obscurity
Trap Door
Illegal/Unethical
Salami Slicing
36. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Passive attacks
Symmetric
DHCP
Toneloc
37. A gas used in fire suppression. Not human safe. Chemical reaction.
Owner
Logic bomb
Phreaker
Halon
38. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
Boot-sector Virus
Honey pot
Throughput of a Biometric System
COM
39. Method of authenticating to a system. Something that you supply and something you know.
Username/password
Finger scanning
Transposition
Accreditation
40. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Covert channels
Caesar Cipher
Trademark
Compiler
41. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Software librarian
Privacy Act of 1974
Packet Sniffing
DNS cache poisoning
42. Deals with the same things as due diligence except that they deal with accepting responsibility instead of liability.
Due Care
Passive attacks
Fire extinguisher
Rijndael
43. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Trademark
Cyphertext only
Finger printing
Risk Mitigation
44. A sandbox. Emulates an operating environment.
Decentralized
Virtual machine
Polymorphism
Digital certificates
45. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
Carnivore
Eavesdropping
MitM
TCB
46. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
Smurf
/etc/passwd
Hacker
Warm Site
47. An international standard defining security assurance and functionality profiles. Replaced the TCSEC - ITSEC - etc.
Halon
Common criteria
ROT-13
Spoofing
48. ('rotate by 13 places' - sometimes hyphenated ROT-13) Is a simple Caesar cipher used for obscuring text by replacing each letter with the letter thirteen places down the alphabet
ROM (Read-only memory)
ROT-13
Virtual machine
Digest
49. Internet Architecture Board. This board is responsible for protecting the Internet.
Fire extinguisher
Man trap
/etc/passwd
IAB
50. Signal degradation as it moves farther from its source
RAM (Random-access memory)
Attenuation
Multipartite
Private Addressing
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests