SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Vocab
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When security is managed at many different points in an organization
Decentralized
COM
ROM (Read-only memory)
Telnet
2. A person able to exploit a system or gain unauthorized access through skill and tactics. This usually refers to a black hat hacker. There are also white hats (ethical hackers) - and grey hats.
Hackers
Debug
Wiretapping
Tort
3. Not a picture - but rather vectors of your finger geometry with an acceptable variance built in to provide for slight changes.
Finger scanning
Fiber optic
Patent
Expert System
4. The fraudulent appropriation by a person to his own use of property or money entrusted to that person's care but owned by someone else.
Teardrop
Degausser
Embezzlement
Hash
5. A network entity that provides a single entrance / exit point to the Internet.
Bastion hosts
Risk Acceptance
Toneloc
Clipping levels
6. Setting up the user to access the honeypot for reasons other than the intent to harm.
Entrapment
Technical - Administrative - Physical
Inference
Out of band
7. In the broadest sense - a fraud is a deception made for personal gain
Fraud
RADIUS (Remote authentication dial-in user service)
Multitasking
VLANs
8. Someone who hacks
Hacker
Digital certificates
Code of ethics
Hearsay Evidence
9. In telecommunications - a callback occurs when the originator of a call is immediately called back in a second call as a response. This helps to make sure that only authorized people are calling in as the number dialing in has to be in the list. Howe
Common criteria
Dictionary Attack
Identification
Callback Security/Call Forwarding
10. A remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access
Polymorphic
Salami Slicing
EF (Exposure Factor)
TACACS (Terminal access controller access control system)
11. Refers to a cryptographic signature - either on a document - or on a lower-level data structure that signs an item electronically.
Hash
RAM (Random-access memory)
Cyphertext only
Digital signing
12. Transferring your risk to someone else - typically an insurance company
DDOS
Separation of duties
Risk Transferring
Security kernel
13. Trusted Computing Base. Comprised of the hardware - software - and firmware of the system.
Centralized
TCB
Multipartite
Data remanence
14. Same as a block cipher except that it is applied to a data stream one bit at a time
Stream cipher
Dogs
Risk Transferring
Object Oriented Programming
15. Internet Relay Chat.
IRC
Worm
Block cipher
DDOS
16. Signal degradation as it moves farther from its source
Object Oriented Programming
Attenuation
Termination procedures
Exit interview
17. Packet sniffers (also known as network or protocol analyzers or Ethernet sniffers) are computer software (usually) or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams travel bac
Packet Sniffing
NAT
Scanning
Cryptanalysis
18. The intercepting of conversations by unintended recipients
Coax
Eavesdropping
Format 7 times
OLE
19. A form of binary to text encoding that originated as a Unix program for encoding binary data for transmission over the uucp mail system. The name 'uuencode' is derived from 'Unix-to-Unix encoding'. Since uucp converted characters between various comp
UUEncode
Spoofing
Substitution
Content dependant
20. A standard protocol for interfacing external application software with an information server - commonly a web server. This allows the server to pass requests from a client web browser to the external application. The web server can then return the ou
CGI (The Common Gateway Interface)
Normalization
Enticement
Hacker
21. Random Number Base
Fraggle
TCB
Nonce
Risk Analysis
22. Threat to physical security.
DDOS
Sabotage
Session Hijacking
Dogs
23. In risk assessment - the average monetary value of losses per year. SLE x ARO = ALE
Object Oriented Programming
Bugtraq
Format 7 times
ALE (Annualized Loss Expectancy)
24. In cryptography - it is one of the simplest and most widely-known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions further down the alphabet.
Brewer-Nash model
Caesar Cipher
SLE (Single Loss Expectancy or Exposure)
Asset Value
25. In a distributed attack - the attacking computer hosts are often zombie computers with broadband connections to the Internet that have been compromised by viruses or Trojan horse programs that allow the perpetrator to remotely control the machine and
EF (Exposure Factor)
Java
DDOS
Non-repudiation
26. Dialing fixed sets telephone numbers looking for open modem connections to machines
Fraggle
Fences
War driving
War dialing
27. The practice of obtaining confidential information by manipulation of legitimate users.
Masquerade
Expert systems
Risk Acceptance
Social engineering
28. An agreement that you make with another company to be able to use their facilities in the event of a disaster. The least expensive - and not usually enforceable.
Identification
Patriot Act
Toneloc
Reciprocal agreement
29. To not be legal (as far as law is concerned) or ethical
Packet Sniffing
Illegal/Unethical
Back door/ trap door/maintenance hook
COOP
30. False Acceptance Rate - False Rejection Rate - Crossover Error Rate
Digital signing
FAR/FRR/CER
Probing
Risk Acceptance
31. 0 = striping without parity 1 = mirroring 3 = striping with parity (parity on single drive) 5 = striping with parity (parity striped across all drives)
Packet Sniffing
Raid 0 - 1 - 3 - 5
Exit interview
Trademark
32. The government required overwrite rate if you are formatting a drive in such a manner as to make it nearly impossible to retrieve data from it
Format 7 times
Logic bomb
Authorization
WTLS (Wireless Transport Layer Security)
33. A class of storage media used in computers and other electronic devices. Because it cannot (easily) be written to - its main uses lie in the distribution of firmware.
ROM (Read-only memory)
CIA
Kerberos
COOP
34. The threshold is a baseline for violation activities that may be normal for a user to commit before alarms are raised.
Clipping levels
Replay
TCSEC
Skipjack
35. It can capture radio and satellite communications - telephone calls - faxes and e-mails nearly anywhere in the world and includes computer automated analysis and sorting of intercepts. ECHELON is estimated to intercept up to 3 billion communications
Private Addressing
Echelon
COM
DOS
36. The real cost of acquiring/maintaining/developing a system
Due Care
Repeaters
BIOS
Asset Value
37. Object Linking and Embedding. The ability of an object to be embedded into another object.
CGI (The Common Gateway Interface)
Base-64
l0pht
OLE
38. Once authenticated - the level of access you have to a system
Risk Mitigation
Authorization
Fraud
Due Diligence
39. Also known as a tunnel)
MitM
VPN (Virtual Private Network)
CIO
Hubs
40. The Teardrop attack involved sending IP fragments with overlapping payloads to the target machine.
Decentralized
Teardrop
Skipjack
Script kiddies
41. A gas used in fire suppression. Not human safe. Chemical reaction.
Halon
VLANs
Replay
Biometrics
42. Among the most common types of viruses and the least damaging - these are hidden within applications that must be executed in order to execute the virus.
Bastion hosts
Qualitative
Authentication
Macro
43. A type of virus that changes its telltale code segments so that it ' looks' different from one infected file to another - thus making detection more difficult.
Guards
Packet Sniffing
CHAP
Polymorphic
44. Any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication - which requires only one factor (knowledge of a password) in order to gain access to a syste
Hubs
Certification
Session Hijacking
Two-Factor Authentication
45. Accepting all packets
Buffer overflow
Promiscuous mode
CRC (Cyclic Redundancy Check)
DMZ
46. Common Object Request Broker Architecture.
PKI
Promiscuous mode
CORBA
Spoofing
47. A team of individuals at the highest level of organizational management who have the day-to-day responsibilities of managing a corporation. And don't forget - they are always the ones ultimately responsible for due diligence / due care. They are also
Passive attacks
Accreditation
Senior Management
Security kernel
48. Separation of duties (SoD) is the concept of having more than one person required to complete a task.
Separation of duties
Warm Site
Logic bomb
Eavesdropping
49. This is an attack in which an attacker is able to read - insert and modify at will - messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept message
MitM
Tokens
FAR/FRR/CER
WAP (Wireless Application Protocol)
50. These cryptographic protocols provide secure communications on the Internet. SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use - only the server is authenticated while the client rema
ROM (Read-only memory)
SSL/TLS
Due Care
Block cipher
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests