SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Federal law with many aspects designed to curb terrorist activities; impacts real estate transactions because of disclosure requirements imposed on escrow agents regarding transfer of title and deposits of cash; imposes new disclosure and signature r
User
Security Awareness Training
Kerberos
Patriot Act
2. CISSPs subscribe to a code of ethics for building up the security profession
Smart cards
Code of ethics
ARP (Address Resolution Protocol)
Acceptable use
3. The user
User
Hot Site
Script kiddies
Audit Trail
4. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
CIA
Debug
Format 7 times
Copyright
5. Involving the measurement of quantity or amount.
Reciprocal agreement
Quantitative
RADIUS (Remote authentication dial-in user service)
Security Awareness Training
6. Degaussing is the process of reducing or eliminating an unwanted magnetic field. The Degausser is what actually performs the degaussing.
MOM
Degausser
NAT
Owner
7. When one key of a two-key pair has more encryption pattern than the other
Brewer-Nash model
Multitasking
Asymmetric
Finger printing
8. In the context of computer software - a Trojan horse is a malicious program that is disguised as or embedded within legitimate software.
Trojan horses
Username/password
Wiretapping
Logic bomb
9. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Hackers
Trade Secret
VLANs
VPN (Virtual Private Network)
10. Reasonable doubt
Burden of Proof
Keystroke logging
VPN (Virtual Private Network)
Virtual machine
11. A hidden value or set of values that allows access to a program - computer system - or data. It is sometimes erroneously confused with a backdoor - which (in a computer system) is a method of bypassing normal authentication or securing remote access
Trap Door
TCB
Brewer-Nash model
ARP (Address Resolution Protocol)
12. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Two-Factor Authentication
Cryptanalysis
Fences
EF (Exposure Factor)
13. These viruses usually infect both boot records and files.
Script
Substitution
Patent
Multipartite
14. A type of hash function used to produce a checksum - which is a small - fixed number of bits - against a block of data. This is used to detect errors after transmission or storage.
Reciprocal agreement
CRC (Cyclic Redundancy Check)
Hoax
Attenuation
15. In cryptography - a substitution cipher is a method of encryption by which units of plaintext are substituted with ciphertext according to a regular system; the 'units' may be single letters (the most common) - pairs of letters - triplets of letters
Fire extinguisher
Substitution
Object Oriented Programming
TCP Wrappers
16. A sandbox. Emulates an operating environment.
Virtual machine
ARO (Annualized Rate of Occurrence)
CIA
RAM (Random-access memory)
17. Project initiation - functional design analysis and planning - system design specifications - software development - installation/implementation - operational/maintenance - disposal
Software development lifecycle
Dumpster diving
Session Hijacking
Cookies
18. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Eavesdropping
Multitasking
Toneloc
IRC
19. The physical part of a computer - as distinguished from the computer software that executes within the hardware.
Digital signing
Detective - Preventive - Corrective
Hardware
Two-Factor Authentication
20. A SSO technology that extends Kerberos functionality and improve upon its weaknesses.
Kerberos
SESAME
Format 7 times
Common criteria
21. Once authenticated - the level of access you have to a system
Authorization
Non-repudiation
Hardware
SLE (Single Loss Expectancy or Exposure)
22. The output of a hash function is a digest.
ARP (Address Resolution Protocol)
Birthday attack
Digest
SSO (Single sign-on)
23. The person that determines the permissions to files. The data owner.
Owner
Throughput of a Biometric System
Masquerade
DMZ
24. Technical are IT implemented. Administrative items are things that HR implements. Physical things are things that are tangible.
Technical - Administrative - Physical
Dictionary Attack
SLE (Single Loss Expectancy or Exposure)
Private Addressing
25. Data storage formats and equipment that allow the stored data to be accessed in any order
TCB
Bugtraq
Noise & perturbation
RAM (Random-access memory)
26. After implementing countermeasures - accepting risk for the amount of vulnerability left over
Multipartite
Risk Acceptance
Digest
Clipping levels
27. Issued by the United States National Computer Security Center (NCSC - an arm of the NSA) as 'Trusted Computer System Evaluation Criteria' - a DOD standard 5200.23-STD in December 1985 superseding CSC-STD-001-83 - the TCSEC (frequently referred to as
Cyphertext only
TCSEC
Technical - Administrative - Physical
PAP (Password Authentication Protocol)
28. Method of authenticating to a system. Something that you supply and something you know.
Keystroke logging
Block cipher
Switches / Bridges
Username/password
29. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Twisted pair
Embezzlement
ROM (Read-only memory)
Clipping levels
30. Hardware - software - and firmware elements of a TCB that implement the fundamental security procedures for controlling access to system resources
Penetration testing
Masquerade
Cold Site
Security kernel
31. A network entity that provides a single entrance / exit point to the Internet.
Bastion hosts
Tailgating / Piggybacking
Penetration testing
Dumpster diving
32. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Raid 0 - 1 - 3 - 5
ROM (Read-only memory)
Code of ethics
Exit interview
33. When you know something from a source - and can infer other related information based off of what you know - when you may not necessarily have access to that data normally.
Routers
ARO (Annualized Rate of Occurrence)
Noise & perturbation
Inference
34. A specialized version of a data warehouse. Like data warehouses - data marts contain a snapshot of operational data that helps business people to strategize based on analyses of past trends and experiences. The key difference is that the creation of
CIA
Brute force
Data Mart
l0pht
35. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Firmware
SSL/TLS
Penetration testing
Software development lifecycle
36. A site that is ready and available within minutes or hours to continue processing. This is a site that is fully configured and ready to go.
Hot Site
SLE (Single Loss Expectancy or Exposure)
Halon
Carnivore
37. In cryptanalysis - a brute force attack is a method of defeating a cryptographic scheme by trying a large number of possibilities. In most schemes - the theoretical possibility of a brute force attack is recognised - but it is set up in such a way th
OEP
DAD
Replay
Brute force
38. More discriminate than dogs
Guards
Boot-sector Virus
ARP (Address Resolution Protocol)
Covert channels
39. Business Impact Analysis. A BIA is a functional analysis in which a team collects data through interviews and documentary sources. It documents business functions - activities - and transactions.
Telnet
Separation of duties
BIA
Cold Site
40. A spoofing attack - a kind of attack in data communication - in which a third party tries to mislead the communication participants using forged information.
Masquerade
Social engineering
Bugtraq
CD-Rom
41. Network devices that operate at layer 3. This device separates broadcast domains.
Hearsay Evidence
Raid 0 - 1 - 3 - 5
Routers
Attenuation
42. Software designed to infiltrate or damage a computer system - without the owner's consent.
Asymmetric
CIRT
Firewall types
Malware
43. A gas used in fire suppression. Not human safe. Chemical reaction.
Halon
Transposition
IRC
Attenuation
44. Repeats the signal. It amplifies the signal before sending it on.
COM
Compiler
Repeaters
Malware
45. Distributed Component Object Model. Microsoft's implementation of CORBA.
Content dependant
DCOM
Smart cards
Motion detector
46. Signal degradation as it moves farther from its source
Attenuation
Promiscuous mode
Polymorphic
CIRT
47. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
Tort
RADIUS (Remote authentication dial-in user service)
UUEncode
Encryption
48. A hash function (or hash algorithm) is a way of creating a small digital 'fingerprint' from any kind of data. The function chops and mixes the data to create the fingerprint - often called a hash value. The hash value is commonly represented as a sho
Back door/ trap door/maintenance hook
Hash
Inference
Session Hijacking
49. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Penetration testing
Promiscuous mode
Fences
VLANs
50. A mechanism by which connections to TCP services on a system are allowed or disallowed
TCP Wrappers
Twisted pair
Vulnerability analysis tools
Halon