SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A site that is ready physically but has no hardware in place - all it has is HVAC
WAP (Wireless Application Protocol)
Substitution
Cold Site
SESAME
2. A system designed to stop piggybacking.
Masquerade
NAT
Man trap
Acceptable use
3. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.
Logic bomb
Eavesdropping
Schema
Cryptanalysis
4. Communications that don't take the natural course of email (when you don't want eavesdropping to happen)
Out of band
Man trap
Promiscuous mode
Skipjack
5. If an employee is suspected of wrongdoing - sending them away from work for a while so that their actions can be audited.
Symmetric
Inference
Mandatory vacation
Honey pot
6. Accepting all packets
Promiscuous mode
CD-Rom
MOM
Bugtraq
7. This deals with differences between plaintext password storage and transmission - versus encrypted password storage and transmission.
Decentralized
Cyphertext only
Firewall types
Worm
8. Transferring your risk to someone else - typically an insurance company
Biometrics
Degausser
Key Escrow
Risk Transferring
9. This is the file on a UNIX system where usernames to password MD5 hash outputs are stored. The system uses this file to determine if the password entered for a given username is correct.
ActiveX Object Linking and Embedding
/etc/passwd
Kerberos
Cold Site
10. A card that holds information that must be authenticated to before it can reveal the information that it is holding
Smart cards
Quality Assurance
Hot Site
Buffer overflow
11. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Transposition
Covert channels
DDOS
Compiler
12. A simple authentication protocol used to authenticate a user to a remote access server or Internet service provider (ISP). Almost all NOS remote servers support PAP. PAP transmits unencrypted ASCII passwords over the network and is therefore consider
SESAME
NAT
PAP (Password Authentication Protocol)
Routers
13. Network devices that operate at layer 2. Every port on a switch is a separate collision domain
Switches / Bridges
Technical - Administrative - Physical
Multiprocessing
Custodian
14. Closed Circuit Television
Routers
Masquerade
Accreditation
CCTV
15. Basic Input/Output System
Asset Value
Trojan horses
Two-Factor Authentication
BIOS
16. Demilitarized Zone. A part of the network that is neither part of the internal network nor directly part of the Internet. Basically a network sitting between two networks.
DMZ
Fire extinguisher
Phreaker
FAR/FRR/CER
17. In classical cryptography - a transposition cipher changes one character from the plaintext to another (to decrypt the reverse is done). That is - the order of the characters is changed. Mathematically a bijective function is used on the characters'
Decentralized
Finger scanning
Transposition
DHCP
18. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Multitasking
Noise & perturbation
RADIUS (Remote authentication dial-in user service)
Fiber optic
19. Occupant Emergency Plan - Employees are the most important!
/etc/passwd
Base-64
OEP
Logic bomb
20. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Masquerade
CHAP
Job rotation
PAP (Password Authentication Protocol)
21. Defines the objects and their attributes that exist in a database.
SQL (Structured Query Language)
Encryption
Replay
Schema
22. In computing - Secure Shell or SSH is a set of standards and an associated network protocol that allows establishing a secure channel between a local and a remote computer. It uses public-key cryptography to authenticate the remote computer and (opti
Virtual machine
Authorization
Trojan horses
SSH
23. Must be in place for you to use a biometric system
IAB
Biometric profile
FAR/FRR/CER
Clipping levels
24. Also known as Rijndael - is a block cipher adopted as an encryption standard by the US government. It is expected to be used worldwide and analyzed extensively - as was the case with its predecessor - the Data Encryption Standard (DES). AES was adopt
Due Care
/etc/passwd
AES (Advanced Encryption Standard)
CRC (Cyclic Redundancy Check)
25. Be at least 8 foot tall and have three strands of barbed wire.
Fences
EF (Exposure Factor)
Spoofing
Hash
26. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Penetration testing
Trade Secret
TACACS (Terminal access controller access control system)
Cold Site
27. The most popular computer language used to create - modify - retrieve and manipulate data from relational database management systems. The language has evolved beyond its original purpose to support object-relational database management systems. It i
SQL (Structured Query Language)
Echelon
Fraud
BIA
28. An arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party - so that someone else (typically government agencies) can obtain them to decrypt messages which they suspect to be relevant to national security.
Key Escrow
SQL (Structured Query Language)
MitM
ActiveX Object Linking and Embedding
29. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Throughput of a Biometric System
Noise & perturbation
Man trap
Separation of duties
30. When security is managed at many different points in an organization
Authorization creep
Decentralized
IRC
Username/password
31. An attack which results in an unauthorized state change - such as the manipulation of files - or the adding of unauthorized files.
Boot-sector Virus
Active attacks
War driving
Identification
32. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
VLANs
Session Hijacking
Active attacks
WAP (Wireless Application Protocol)
33. Systems that use a knowledge base - an inference engine - and general methods for searching problem solutions.
COM
Promiscuous mode
Salami Slicing
Expert systems
34. These viruses usually infect both boot records and files.
Crosstalk
Base-64
Clipper Chip
Multipartite
35. In cryptanalysis - this attack is a method of defeating a cryptographic scheme by trying a large number of possibilities; for example - exhaustively working through all possible keys in order to decrypt a message. In most schemes - the theoretical po
MitM
Telnet
Brute Force
Macro
36. Diffie-Hellman (D-H) key exchange is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure communications channel. This key can then be used to encrypt s
WTLS (Wireless Transport Layer Security)
Biometric profile
Diffie-Hellman
CRC (Cyclic Redundancy Check)
37. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Privacy Act of 1974
Risk Analysis
Twisted pair
Clipper Chip
38. In computing - the Challenge-Handshake Authentication Protocol authenticates a user to an Internet access provider. CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and of a variable
SESAME
Trap Door
CHAP
Authorization
39. The key that is used to encrypt a file or message is the same key that is used to decrypt the file or message
Virtual Memory/Pagefile.sys
Symmetric
Schema
Accreditation
40. Dialing fixed sets telephone numbers looking for open modem connections to machines
War dialing
Echelon
Hoax
Session Hijacking
41. A gas used in fire suppression. Not human safe. Chemical reaction.
Active attacks
Separation of duties
Patent
Halon
42. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Hot Site
Degausser
Change management
Brute force
43. Procedures for when an employee is terminated to ensure that they are aware of their responsibilities and turn in all company property.
Termination procedures
Identification
Substitution
Hardware
44. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Patriot Act
ARP (Address Resolution Protocol)
Inference
Biometric profile
45. Methodical process of finding and reducing the number of bugs - or defects - in a computer program or a piece of electronic hardware thus making it behave as expected
Authorization
Debug
ROM (Read-only memory)
Non-repudiation
46. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
OLE
Polymorphism
ROM (Read-only memory)
l0pht
47. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
CORBA
Masquerade
CEO
Kerberos
48. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
Qualitative
Termination procedures
Content dependant
BIA
49. In computer science - it means allowing a single definition to be used with different types of data (specifically - different classes of objects). For instance - a polymorphic function definition can replace several type-specific ones - and a single
Risk Mitigation
Polymorphism
Authorization
Accreditation
50. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
PKI
FAR/FRR/CER
TCSEC
Covert channels