SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Biometrics
TACACS (Terminal access controller access control system)
User
Termination procedures
2. A hidden communications channel on a system that allows for the bypassing of the system security policy
Owner
Schema
Rijndael
Covert channels
3. In cryptography - encryption is the process of obscuring information to make it unreadable without special knowledge.
Echelon
Encryption
Trade Secret
/etc/passwd
4. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
CCTV
Burden of Proof
Digital signing
DOS
5. Occupant Emergency Plan - Employees are the most important!
OEP
IAB
Quantitative
Back door/ trap door/maintenance hook
6. The EU spec. If databases exist - users are allowed to check data into them - allowed to change them if wrong - etc.
Username/password
ROT-13
Privacy Act of 1974
Vulnerability analysis tools
7. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Hardware
Skipjack
Hearsay Evidence
Hackers
8. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
Two-Factor Authentication
Back door/ trap door/maintenance hook
SSL/TLS
Tokens
9. A computer program that contains some of the subject-specific knowledge of one or more human experts. The most common form of expert systems is a program (like a wizard) made up of a set of rules that analyze information (usually supplied by the user
Expert System
TACACS (Terminal access controller access control system)
COOP
Software librarian
10. A computer program (or set of programs) that translates text written in a computer language (the source language) into another computer language (the target language).
Polymorphic
Dogs
Compiler
Authorization creep
11. Also known as a tunnel)
Transposition
PKI
AES (Advanced Encryption Standard)
VPN (Virtual Private Network)
12. A set of exclusive rights granted by governments to regulate the use of a particular expression of an idea or information. Artists ability to control their work
Copyright
Risk Analysis
Session Hijacking
WTLS (Wireless Transport Layer Security)
13. A name given to a system implemented by the FBI that is analogous to wiretapping except in this case - e-mail and other communications are being tapped instead of telephone conversations. Carnivore was essentially a customizable packet sniffer that c
Bastion hosts
Carnivore
Due Diligence
COOP
14. The process of certifying a system that has been built to ensure that it meets the security standards that you have said you will use.
Finger scanning
Certification
Smurf
Hackers
15. Base 64 is a positional numeral system using a base of 64. It is the largest power of two base that can be represented using only printable ASCII characters. This has led to its use as a transfer encoding for e-mail among other things.
DAD
Identification
Security through obscurity
Base-64
16. In computer terminology - a honeypot is a trap set to detect - deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer - data or a network site that appears to be part of a network
MitM
Quality Assurance
Guards
Honey pot
17. Network device that operates at layer 1. Concentrator.
Cold Site
Debug
Hubs
Penetration testing
18. Computer Incident Response Team
Two-Factor Authentication
VLANs
Username/password
CIRT
19. Rotating employee's job duties so that things can be checked that they are doing to make sure nothing fraudulent is occurring.
Job rotation
DHCP
Expert System
WTLS (Wireless Transport Layer Security)
20. In cryptography - it is a block cipher
Security through obscurity
Dogs
Switches / Bridges
Skipjack
21. An attempt to trick the system into believing that something false is real
ActiveX Object Linking and Embedding
Noise & perturbation
TCSEC
Hoax
22. A network that mimics the brain
Senior Management
Promiscuous mode
Artificial Neural Networks (ANN)
Digital certificates
23. Chief Executive Officer
Certification
CEO
Decentralized
Patriot Act
24. Closed Circuit Television
SSL/TLS
Degausser
CCTV
Hoax
25. In a computer system (or cryptosystem or algorithm) these are methods of bypassing normal authentication or securing remote access to a computer - while attempting to remain hidden from casual inspection.
Back door/ trap door/maintenance hook
CIRT
Bastion hosts
Warm Site
26. Grabs an image of the finger which is then stored in a database and then works in a one-to-many database
Joke
MOM
Finger printing
Risk Mitigation
27. Virtual LANs. Separating broadcast domains on a single network. A way of partitioning communications channels.
Biometric profile
VLANs
Non-repudiation
Artificial Neural Networks (ANN)
28. The practice of obtaining confidential information by manipulation of legitimate users.
IAB
Coax
Virtual machine
Social engineering
29. Assuming someone's session who is unaware of what you are doing
Schema
Trademark
Fire extinguisher
Session Hijacking
30. The amount of users that the system can process in a given amount of time. A typical acceptable amount is 10/minute
Probing
Biometrics
Accreditation
Throughput of a Biometric System
31. A legal term used to describe an out-of-court statement offered to establish the truth of the facts asserted in that statement. Hearsay is generally not admissible in common law courts because it is of dubious value - but there are many exceptions to
DDOS
Job rotation
Cryptanalysis
Hearsay Evidence
32. A sandbox. Emulates an operating environment.
TEMPEST
Packet Sniffing
Mandatory vacation
Virtual machine
33. Countermeasure to put fake stuff into a database so if someone is reading it they will get the wrong info.
Noise & perturbation
Call tree
Session Hijacking
Common criteria
34. A component in the Wireless Application Protocol (WAP) protocol stack. It sits between the WTP and WDP layers in the WAP communications stack.
Trojan horses
NAT
Mandatory vacation
WTLS (Wireless Transport Layer Security)
35. White hat l0pht
Toneloc
Senior Management
Active attacks
Bugtraq
36. A distinctive sign of some kind which is used by a business to uniquely identify itself and its products and services to consumers - and to distinguish the business and its products and / or services from those of other businesses.
TCB
Incentive programs
Trademark
/etc/passwd
37. In a separation of duties model - this is where code is checked in and out
Salami Slicing
Virtual machine
Separation of duties
Software librarian
38. Reasonable doubt
SESAME
Burden of Proof
MitM
Trap Door
39. A form of redundancy check (a very simple measure for protecting the integrity of data by detecting errors in data that is sent through space or time.
MOM
Checksum
Script kiddies
Asset Value
40. A system designed to stop piggybacking.
Skipjack
Bugtraq
Man trap
Decentralized
41. Chief Information Officer
Phreaker
Active attacks
Masquerade
CIO
42. Internet Architecture Board. This board is responsible for protecting the Internet.
IAB
CIA
Throughput of a Biometric System
Guards
43. Signal degradation as it moves farther from its source
Identification
Eavesdropping
TACACS (Terminal access controller access control system)
Attenuation
44. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Aggregation
Cookies
Teardrop
Two-Factor Authentication
45. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Macro
Masquerade
TCSEC
Virtual machine
46. Same as a block cipher except that it is applied to a data stream one bit at a time
Key Escrow
Stream cipher
SSH
Smurf
47. The apparent simultaneous performance of two or more tasks by a computer's central processing unit.
Multiprocessing
Guards
Multitasking
Embezzlement
48. Confidentiality - Integrity - and Availability
CIA
Asset Value
Routers
Risk Transferring
49. A number of computer software products and specifications from Sun Microsystems that together provide a system for developing and deploying cross-platform applications. Java is used in a wide variety of computing platforms spanning from embedded devi
CD-Rom
Fraud
Java
IAB
50. In the broadest sense - a fraud is a deception made for personal gain
Fraud
Diffie-Hellman
PAP (Password Authentication Protocol)
Smurf